{
  "type": "URL",
  "indicator": "https://bbs.jqueryapi.info",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://bbs.jqueryapi.info",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 3752871242,
      "indicator": "https://bbs.jqueryapi.info",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 24,
      "pulses": [
        {
          "id": "655bb326c4023eb59c1f73b9",
          "name": "WebToolbar",
          "description": "\"Domain Seized - http://server3.elgenero.com/cgi-bin/xdown.cgi\"\nDomain stated ' SEIZED' by Department of Homeland Security is a 'HOAX' \nLink leads to a new domain with same behavior: http://server3.elgenero.com/iprc_seized_banner.png",
          "modified": "2023-12-20T19:02:04.107000",
          "created": "2023-11-20T19:27:34.827000",
          "tags": [
            "no data",
            "tag count",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "blacklist",
            "spammer",
            "firehol",
            "united",
            "anonymizer",
            "team proxy",
            "cyber threat",
            "team http",
            "attacker",
            "maltiverse http",
            "phishing site",
            "malware",
            "team",
            "phishing",
            "malicious",
            "facebook",
            "service",
            "bank",
            "panama",
            "suppobox",
            "asyncrat",
            "cobalt strike",
            "cve201711882",
            "cisco umbrella",
            "heur",
            "site",
            "alexa top",
            "million",
            "safe site",
            "alexa",
            "malicious site",
            "malware site",
            "riskware",
            "exploit",
            "artemis",
            "iframe",
            "unsafe",
            "agent",
            "win64",
            "zbot",
            "fakealert",
            "conduit",
            "crack",
            "back",
            "download",
            "acint",
            "installpack",
            "xtrat",
            "nircmd",
            "psexec",
            "occamy",
            "brontok",
            "zpevdo",
            "startpage",
            "nanocore",
            "keygen",
            "fareit",
            "secrisk",
            "unruy",
            "filetour",
            "installcore",
            "floxif",
            "cleaner",
            "patcher",
            "opencandy",
            "adload",
            "presenoker",
            "wacatac",
            "swrort",
            "fusioncore",
            "pony",
            "applicunwnt",
            "union",
            "webtoolbar",
            "trojanspy",
            "maltiverse",
            "blacklist http",
            "ssl certificate",
            "execution",
            "whois record",
            "contacted",
            "whois whois",
            "historical ssl",
            "communicating",
            "referrer",
            "pe resource",
            "resolutions",
            "hacktool",
            "emotet",
            "agent tesla",
            "love",
            "mirai",
            "satacom",
            "probe",
            "critical",
            "copy",
            "dark power",
            "core",
            "chaos",
            "ransomexx",
            "quasar",
            "malvertizing",
            "spyware",
            "cnc",
            "trojan",
            "phishing",
            "botnetwork",
            "fraud services",
            "defacement",
            "department of homeland security hoax banner",
            "tulach",
            "sabey",
            "targeting",
            "cyber threat",
            "tsara brashears",
            ".gov",
            "dhs",
            "fbi",
            "interpol",
            "doj",
            "nypd",
            "dpd",
            "irs",
            "nsa",
            "cia",
            "soc",
            "hacker"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 37,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 573,
            "FileHash-SHA1": 327,
            "FileHash-SHA256": 1474,
            "CVE": 20,
            "domain": 546,
            "hostname": 1215,
            "URL": 3249
          },
          "indicator_count": 7404,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 219,
          "modified_text": "851 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6558c481715409563073cb79",
          "name": "Fraud Services",
          "description": "http://kramtechnology.com/, fraud services, network, rat, trojan, phishing, malvertizing, malware hosting, scanning host, archives browser events.",
          "modified": "2023-12-18T05:05:36.760000",
          "created": "2023-11-18T14:04:48.923000",
          "tags": [
            "methodpost",
            "dropped",
            "contacted",
            "ssl certificate",
            "whois record",
            "zva8k4ghshhpcb5",
            "contacted urls",
            "q0gpyr1balpdgpo",
            "historical ssl",
            "page dow",
            "blacklist http",
            "cisco umbrella",
            "site",
            "alexa top",
            "safe site",
            "million",
            "paypal",
            "team phishing",
            "malicious url",
            "alexa",
            "azorult",
            "phishing",
            "service",
            "runescape",
            "facebook",
            "bank",
            "download",
            "malware",
            "united",
            "passive dns",
            "scan endpoints",
            "all search",
            "otx octoseek",
            "ipv4",
            "pulse pulses",
            "urls",
            "files",
            "reverse dns",
            "twitter",
            "log id",
            "gmtn",
            "sectigo rsa",
            "secure server",
            "tls web",
            "salford",
            "sectigo limited",
            "ocsp",
            "false",
            "california",
            "british virgin",
            "locality",
            "d3 a5",
            "url http"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 15,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 14816,
            "FileHash-MD5": 41,
            "FileHash-SHA1": 33,
            "FileHash-SHA256": 5158,
            "domain": 3758,
            "hostname": 2961,
            "email": 4,
            "SSLCertFingerprint": 3,
            "CVE": 3
          },
          "indicator_count": 26777,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 222,
          "modified_text": "853 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65580c17e69371b34a573f72",
          "name": "Masquerading",
          "description": "",
          "modified": "2023-12-17T11:03:45.376000",
          "created": "2023-11-18T00:57:59.619000",
          "tags": [
            "no expiration",
            "filehashsha256",
            "filehashmd5",
            "iocs",
            "url http",
            "expiration",
            "scan endpoints",
            "all search",
            "otx octoseek",
            "create new",
            "blacklist http",
            "laplasclipper",
            "malicious url",
            "cisco umbrella",
            "site",
            "alexa top",
            "blacklist",
            "safe site",
            "malware site",
            "phishing site",
            "malicious site",
            "malware",
            "china unknown",
            "united",
            "unknown",
            "as54994 quantil",
            "cname",
            "nxdomain",
            "as8068",
            "as4134 chinanet",
            "passive dns",
            "domain",
            "next",
            "filehashsha1",
            "service company",
            "servers",
            "ndicator role",
            "title added",
            "active related",
            "pulses url",
            "showing",
            "entries",
            "pulses http",
            "url https",
            "type indicator",
            "role title",
            "added active",
            "related pulses",
            "report spam",
            "author avatar",
            "created",
            "hour ago",
            "trojanspy",
            "redline",
            "pulses hostname",
            "blacklist https",
            "indicator role",
            "bidid",
            "adid",
            "v4us",
            "v51845481",
            "hostname",
            "http",
            "cisco",
            "umbrella rank",
            "search live",
            "api blog",
            "docs pricing",
            "november",
            "de summary",
            "frankfurt",
            "main",
            "reverse dns",
            "general full",
            "asn16509",
            "amazon02",
            "resource",
            "protocol h2",
            "security tls",
            "hash",
            "de indicators",
            "domains",
            "hashes",
            "copyright",
            "gmbh version",
            "follow",
            "value",
            "postitem",
            "variables",
            "parameters",
            "systemid object",
            "def function",
            "login",
            "get h2",
            "secrets llc",
            "agreement",
            "the site",
            "content",
            "policy",
            "this site",
            "claims",
            "florida",
            "please",
            "premium",
            "service",
            "restrict",
            "express",
            "media",
            "facebook",
            "twitter",
            "final",
            "first",
            "cloudflarenet",
            "gts ca",
            "software",
            "million",
            "hours ago",
            "chameleon",
            "heur",
            "phishing",
            "riskware",
            "agent",
            "unsafe",
            "opencandy",
            "exploit",
            "mimikatz",
            "iframe",
            "downldr",
            "presenoker",
            "artemis",
            "download",
            "beach research",
            "germany",
            "asn20940",
            "akamaiasn1",
            "threat report",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "alexa",
            "maltiverse",
            "google",
            "qtsas",
            "name value",
            "no data",
            "tag count",
            "count blacklist",
            "pbiptbmvd0k4",
            "glelexoputyh",
            "suppobox",
            "team",
            "bambernek",
            "internet storm",
            "phishtank",
            "phish",
            "trickbot",
            "telecom",
            "bank",
            "ipv4",
            "octoseek report",
            "spam https",
            "tsara brashears",
            "malvertizing",
            "tracking",
            "tagging",
            "spyder",
            "cybercrime",
            "email collection",
            "apple data collection",
            "win32 exe",
            "ms word",
            "document",
            "type name",
            "javascript",
            "network capture",
            "files",
            "detections type",
            "name",
            "ssl certificate",
            "whois whois",
            "tsara brashears",
            "whois record",
            "asn owner",
            "highly targeted",
            "kgs0",
            "kls0",
            "relacionada",
            "family",
            "lolkek",
            "emotet",
            "dark power",
            "wiper",
            "ransomware",
            "cobalt strike",
            "quasar rat",
            "ursnif",
            "remcos",
            "core",
            "redline stealer",
            "bitrat",
            "hacktool",
            "critical",
            "copy",
            "installer",
            "execution",
            "network",
            "communicating",
            "referrer",
            "parent",
            "historical ssl",
            "siblings",
            "resolutions",
            "name verdict",
            "falcon sandbox",
            "pattern match",
            "error",
            "file",
            "indicator",
            "script",
            "typeof e",
            "ascii text",
            "appdata",
            "date",
            "windir",
            "span",
            "body",
            "meta",
            "class",
            "generator",
            "info",
            "null",
            "refresh",
            "hybrid",
            "general",
            "local",
            "click",
            "strings",
            "tools",
            "look",
            "verify",
            "restart",
            "form",
            "footer",
            "html",
            "union",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "swrort",
            "adaptivebee",
            "unruy",
            "iobit",
            "dropper",
            "trojanx",
            "installcore",
            "webshell",
            "crack",
            "webtoolbar",
            "threat roundup",
            "contacted",
            "june",
            "july",
            "october",
            "august"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Beach Research",
              "display_name": "Beach Research",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1090",
              "name": "Proxy",
              "display_name": "T1090 - Proxy"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1102",
              "name": "Web Service",
              "display_name": "T1102 - Web Service"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1199",
              "name": "Trusted Relationship",
              "display_name": "T1199 - Trusted Relationship"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            }
          ],
          "industries": [
            "Health",
            "Nutritional",
            "Medical",
            "Medicine"
          ],
          "TLP": "white",
          "cloned_from": "65574cb4447c8d87ad85fa75",
          "export_count": 103,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 400,
            "FileHash-SHA1": 240,
            "FileHash-SHA256": 6459,
            "hostname": 4845,
            "URL": 11514,
            "CVE": 15,
            "domain": 3179,
            "email": 31
          },
          "indicator_count": 26683,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 226,
          "modified_text": "854 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65580c1516990d69644fb3d0",
          "name": "Masquerading",
          "description": "",
          "modified": "2023-12-17T11:03:45.376000",
          "created": "2023-11-18T00:57:57.372000",
          "tags": [
            "no expiration",
            "filehashsha256",
            "filehashmd5",
            "iocs",
            "url http",
            "expiration",
            "scan endpoints",
            "all search",
            "otx octoseek",
            "create new",
            "blacklist http",
            "laplasclipper",
            "malicious url",
            "cisco umbrella",
            "site",
            "alexa top",
            "blacklist",
            "safe site",
            "malware site",
            "phishing site",
            "malicious site",
            "malware",
            "china unknown",
            "united",
            "unknown",
            "as54994 quantil",
            "cname",
            "nxdomain",
            "as8068",
            "as4134 chinanet",
            "passive dns",
            "domain",
            "next",
            "filehashsha1",
            "service company",
            "servers",
            "ndicator role",
            "title added",
            "active related",
            "pulses url",
            "showing",
            "entries",
            "pulses http",
            "url https",
            "type indicator",
            "role title",
            "added active",
            "related pulses",
            "report spam",
            "author avatar",
            "created",
            "hour ago",
            "trojanspy",
            "redline",
            "pulses hostname",
            "blacklist https",
            "indicator role",
            "bidid",
            "adid",
            "v4us",
            "v51845481",
            "hostname",
            "http",
            "cisco",
            "umbrella rank",
            "search live",
            "api blog",
            "docs pricing",
            "november",
            "de summary",
            "frankfurt",
            "main",
            "reverse dns",
            "general full",
            "asn16509",
            "amazon02",
            "resource",
            "protocol h2",
            "security tls",
            "hash",
            "de indicators",
            "domains",
            "hashes",
            "copyright",
            "gmbh version",
            "follow",
            "value",
            "postitem",
            "variables",
            "parameters",
            "systemid object",
            "def function",
            "login",
            "get h2",
            "secrets llc",
            "agreement",
            "the site",
            "content",
            "policy",
            "this site",
            "claims",
            "florida",
            "please",
            "premium",
            "service",
            "restrict",
            "express",
            "media",
            "facebook",
            "twitter",
            "final",
            "first",
            "cloudflarenet",
            "gts ca",
            "software",
            "million",
            "hours ago",
            "chameleon",
            "heur",
            "phishing",
            "riskware",
            "agent",
            "unsafe",
            "opencandy",
            "exploit",
            "mimikatz",
            "iframe",
            "downldr",
            "presenoker",
            "artemis",
            "download",
            "beach research",
            "germany",
            "asn20940",
            "akamaiasn1",
            "threat report",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "alexa",
            "maltiverse",
            "google",
            "qtsas",
            "name value",
            "no data",
            "tag count",
            "count blacklist",
            "pbiptbmvd0k4",
            "glelexoputyh",
            "suppobox",
            "team",
            "bambernek",
            "internet storm",
            "phishtank",
            "phish",
            "trickbot",
            "telecom",
            "bank",
            "ipv4",
            "octoseek report",
            "spam https",
            "tsara brashears",
            "malvertizing",
            "tracking",
            "tagging",
            "spyder",
            "cybercrime",
            "email collection",
            "apple data collection",
            "win32 exe",
            "ms word",
            "document",
            "type name",
            "javascript",
            "network capture",
            "files",
            "detections type",
            "name",
            "ssl certificate",
            "whois whois",
            "tsara brashears",
            "whois record",
            "asn owner",
            "highly targeted",
            "kgs0",
            "kls0",
            "relacionada",
            "family",
            "lolkek",
            "emotet",
            "dark power",
            "wiper",
            "ransomware",
            "cobalt strike",
            "quasar rat",
            "ursnif",
            "remcos",
            "core",
            "redline stealer",
            "bitrat",
            "hacktool",
            "critical",
            "copy",
            "installer",
            "execution",
            "network",
            "communicating",
            "referrer",
            "parent",
            "historical ssl",
            "siblings",
            "resolutions",
            "name verdict",
            "falcon sandbox",
            "pattern match",
            "error",
            "file",
            "indicator",
            "script",
            "typeof e",
            "ascii text",
            "appdata",
            "date",
            "windir",
            "span",
            "body",
            "meta",
            "class",
            "generator",
            "info",
            "null",
            "refresh",
            "hybrid",
            "general",
            "local",
            "click",
            "strings",
            "tools",
            "look",
            "verify",
            "restart",
            "form",
            "footer",
            "html",
            "union",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "swrort",
            "adaptivebee",
            "unruy",
            "iobit",
            "dropper",
            "trojanx",
            "installcore",
            "webshell",
            "crack",
            "webtoolbar",
            "threat roundup",
            "contacted",
            "june",
            "july",
            "october",
            "august"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Beach Research",
              "display_name": "Beach Research",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1090",
              "name": "Proxy",
              "display_name": "T1090 - Proxy"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1102",
              "name": "Web Service",
              "display_name": "T1102 - Web Service"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1199",
              "name": "Trusted Relationship",
              "display_name": "T1199 - Trusted Relationship"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            }
          ],
          "industries": [
            "Health",
            "Nutritional",
            "Medical",
            "Medicine"
          ],
          "TLP": "white",
          "cloned_from": "65574cb4447c8d87ad85fa75",
          "export_count": 100,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 400,
            "FileHash-SHA1": 240,
            "FileHash-SHA256": 6459,
            "hostname": 4845,
            "URL": 11514,
            "CVE": 15,
            "domain": 3179,
            "email": 31
          },
          "indicator_count": 26683,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 226,
          "modified_text": "854 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65574cbe6bdbe24ecb170b24",
          "name": "Masquerading",
          "description": "",
          "modified": "2023-12-17T11:03:45.376000",
          "created": "2023-11-17T11:21:34.083000",
          "tags": [
            "no expiration",
            "filehashsha256",
            "filehashmd5",
            "iocs",
            "url http",
            "expiration",
            "scan endpoints",
            "all search",
            "otx octoseek",
            "create new",
            "blacklist http",
            "laplasclipper",
            "malicious url",
            "cisco umbrella",
            "site",
            "alexa top",
            "blacklist",
            "safe site",
            "malware site",
            "phishing site",
            "malicious site",
            "malware",
            "china unknown",
            "united",
            "unknown",
            "as54994 quantil",
            "cname",
            "nxdomain",
            "as8068",
            "as4134 chinanet",
            "passive dns",
            "domain",
            "next",
            "filehashsha1",
            "service company",
            "servers",
            "ndicator role",
            "title added",
            "active related",
            "pulses url",
            "showing",
            "entries",
            "pulses http",
            "url https",
            "type indicator",
            "role title",
            "added active",
            "related pulses",
            "report spam",
            "author avatar",
            "created",
            "hour ago",
            "trojanspy",
            "redline",
            "pulses hostname",
            "blacklist https",
            "indicator role",
            "bidid",
            "adid",
            "v4us",
            "v51845481",
            "hostname",
            "http",
            "cisco",
            "umbrella rank",
            "search live",
            "api blog",
            "docs pricing",
            "november",
            "de summary",
            "frankfurt",
            "main",
            "reverse dns",
            "general full",
            "asn16509",
            "amazon02",
            "resource",
            "protocol h2",
            "security tls",
            "hash",
            "de indicators",
            "domains",
            "hashes",
            "copyright",
            "gmbh version",
            "follow",
            "value",
            "postitem",
            "variables",
            "parameters",
            "systemid object",
            "def function",
            "login",
            "get h2",
            "secrets llc",
            "agreement",
            "the site",
            "content",
            "policy",
            "this site",
            "claims",
            "florida",
            "please",
            "premium",
            "service",
            "restrict",
            "express",
            "media",
            "facebook",
            "twitter",
            "final",
            "first",
            "cloudflarenet",
            "gts ca",
            "software",
            "million",
            "hours ago",
            "chameleon",
            "heur",
            "phishing",
            "riskware",
            "agent",
            "unsafe",
            "opencandy",
            "exploit",
            "mimikatz",
            "iframe",
            "downldr",
            "presenoker",
            "artemis",
            "download",
            "beach research",
            "germany",
            "asn20940",
            "akamaiasn1",
            "threat report",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "alexa",
            "maltiverse",
            "google",
            "qtsas",
            "name value",
            "no data",
            "tag count",
            "count blacklist",
            "pbiptbmvd0k4",
            "glelexoputyh",
            "suppobox",
            "team",
            "bambernek",
            "internet storm",
            "phishtank",
            "phish",
            "trickbot",
            "telecom",
            "bank",
            "ipv4",
            "octoseek report",
            "spam https",
            "tsara brashears",
            "malvertizing",
            "tracking",
            "tagging",
            "spyder",
            "cybercrime",
            "email collection",
            "apple data collection",
            "win32 exe",
            "ms word",
            "document",
            "type name",
            "javascript",
            "network capture",
            "files",
            "detections type",
            "name",
            "ssl certificate",
            "whois whois",
            "tsara brashears",
            "whois record",
            "asn owner",
            "highly targeted",
            "kgs0",
            "kls0",
            "relacionada",
            "family",
            "lolkek",
            "emotet",
            "dark power",
            "wiper",
            "ransomware",
            "cobalt strike",
            "quasar rat",
            "ursnif",
            "remcos",
            "core",
            "redline stealer",
            "bitrat",
            "hacktool",
            "critical",
            "copy",
            "installer",
            "execution",
            "network",
            "communicating",
            "referrer",
            "parent",
            "historical ssl",
            "siblings",
            "resolutions",
            "name verdict",
            "falcon sandbox",
            "pattern match",
            "error",
            "file",
            "indicator",
            "script",
            "typeof e",
            "ascii text",
            "appdata",
            "date",
            "windir",
            "span",
            "body",
            "meta",
            "class",
            "generator",
            "info",
            "null",
            "refresh",
            "hybrid",
            "general",
            "local",
            "click",
            "strings",
            "tools",
            "look",
            "verify",
            "restart",
            "form",
            "footer",
            "html",
            "union",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "swrort",
            "adaptivebee",
            "unruy",
            "iobit",
            "dropper",
            "trojanx",
            "installcore",
            "webshell",
            "crack",
            "webtoolbar",
            "threat roundup",
            "contacted",
            "june",
            "july",
            "october",
            "august"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Beach Research",
              "display_name": "Beach Research",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1090",
              "name": "Proxy",
              "display_name": "T1090 - Proxy"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1102",
              "name": "Web Service",
              "display_name": "T1102 - Web Service"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1199",
              "name": "Trusted Relationship",
              "display_name": "T1199 - Trusted Relationship"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            }
          ],
          "industries": [
            "Health",
            "Nutritional",
            "Medical",
            "Medicine"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 102,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 400,
            "FileHash-SHA1": 240,
            "FileHash-SHA256": 6459,
            "hostname": 4845,
            "URL": 11514,
            "CVE": 15,
            "domain": 3179,
            "email": 31
          },
          "indicator_count": 26683,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "854 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65574cb4447c8d87ad85fa75",
          "name": "Masquerading",
          "description": "",
          "modified": "2023-12-17T11:03:45.376000",
          "created": "2023-11-17T11:21:24.343000",
          "tags": [
            "no expiration",
            "filehashsha256",
            "filehashmd5",
            "iocs",
            "url http",
            "expiration",
            "scan endpoints",
            "all search",
            "otx octoseek",
            "create new",
            "blacklist http",
            "laplasclipper",
            "malicious url",
            "cisco umbrella",
            "site",
            "alexa top",
            "blacklist",
            "safe site",
            "malware site",
            "phishing site",
            "malicious site",
            "malware",
            "china unknown",
            "united",
            "unknown",
            "as54994 quantil",
            "cname",
            "nxdomain",
            "as8068",
            "as4134 chinanet",
            "passive dns",
            "domain",
            "next",
            "filehashsha1",
            "service company",
            "servers",
            "ndicator role",
            "title added",
            "active related",
            "pulses url",
            "showing",
            "entries",
            "pulses http",
            "url https",
            "type indicator",
            "role title",
            "added active",
            "related pulses",
            "report spam",
            "author avatar",
            "created",
            "hour ago",
            "trojanspy",
            "redline",
            "pulses hostname",
            "blacklist https",
            "indicator role",
            "bidid",
            "adid",
            "v4us",
            "v51845481",
            "hostname",
            "http",
            "cisco",
            "umbrella rank",
            "search live",
            "api blog",
            "docs pricing",
            "november",
            "de summary",
            "frankfurt",
            "main",
            "reverse dns",
            "general full",
            "asn16509",
            "amazon02",
            "resource",
            "protocol h2",
            "security tls",
            "hash",
            "de indicators",
            "domains",
            "hashes",
            "copyright",
            "gmbh version",
            "follow",
            "value",
            "postitem",
            "variables",
            "parameters",
            "systemid object",
            "def function",
            "login",
            "get h2",
            "secrets llc",
            "agreement",
            "the site",
            "content",
            "policy",
            "this site",
            "claims",
            "florida",
            "please",
            "premium",
            "service",
            "restrict",
            "express",
            "media",
            "facebook",
            "twitter",
            "final",
            "first",
            "cloudflarenet",
            "gts ca",
            "software",
            "million",
            "hours ago",
            "chameleon",
            "heur",
            "phishing",
            "riskware",
            "agent",
            "unsafe",
            "opencandy",
            "exploit",
            "mimikatz",
            "iframe",
            "downldr",
            "presenoker",
            "artemis",
            "download",
            "beach research",
            "germany",
            "asn20940",
            "akamaiasn1",
            "threat report",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "alexa",
            "maltiverse",
            "google",
            "qtsas",
            "name value",
            "no data",
            "tag count",
            "count blacklist",
            "pbiptbmvd0k4",
            "glelexoputyh",
            "suppobox",
            "team",
            "bambernek",
            "internet storm",
            "phishtank",
            "phish",
            "trickbot",
            "telecom",
            "bank",
            "ipv4",
            "octoseek report",
            "spam https",
            "tsara brashears",
            "malvertizing",
            "tracking",
            "tagging",
            "spyder",
            "cybercrime",
            "email collection",
            "apple data collection",
            "win32 exe",
            "ms word",
            "document",
            "type name",
            "javascript",
            "network capture",
            "files",
            "detections type",
            "name",
            "ssl certificate",
            "whois whois",
            "tsara brashears",
            "whois record",
            "asn owner",
            "highly targeted",
            "kgs0",
            "kls0",
            "relacionada",
            "family",
            "lolkek",
            "emotet",
            "dark power",
            "wiper",
            "ransomware",
            "cobalt strike",
            "quasar rat",
            "ursnif",
            "remcos",
            "core",
            "redline stealer",
            "bitrat",
            "hacktool",
            "critical",
            "copy",
            "installer",
            "execution",
            "network",
            "communicating",
            "referrer",
            "parent",
            "historical ssl",
            "siblings",
            "resolutions",
            "name verdict",
            "falcon sandbox",
            "pattern match",
            "error",
            "file",
            "indicator",
            "script",
            "typeof e",
            "ascii text",
            "appdata",
            "date",
            "windir",
            "span",
            "body",
            "meta",
            "class",
            "generator",
            "info",
            "null",
            "refresh",
            "hybrid",
            "general",
            "local",
            "click",
            "strings",
            "tools",
            "look",
            "verify",
            "restart",
            "form",
            "footer",
            "html",
            "union",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "swrort",
            "adaptivebee",
            "unruy",
            "iobit",
            "dropper",
            "trojanx",
            "installcore",
            "webshell",
            "crack",
            "webtoolbar",
            "threat roundup",
            "contacted",
            "june",
            "july",
            "october",
            "august"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Beach Research",
              "display_name": "Beach Research",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1090",
              "name": "Proxy",
              "display_name": "T1090 - Proxy"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1102",
              "name": "Web Service",
              "display_name": "T1102 - Web Service"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1199",
              "name": "Trusted Relationship",
              "display_name": "T1199 - Trusted Relationship"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            }
          ],
          "industries": [
            "Health",
            "Nutritional",
            "Medical",
            "Medicine"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 103,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 400,
            "FileHash-SHA1": 240,
            "FileHash-SHA256": 6459,
            "hostname": 4845,
            "URL": 11514,
            "CVE": 15,
            "domain": 3179,
            "email": 31
          },
          "indicator_count": 26683,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 222,
          "modified_text": "854 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "655652f6ddcbf952a599cded",
          "name": "https://myaccount.uscis.gov/",
          "description": "After Mark Montano Md reported alleged acts by Jeffrey Scott Reimer after receiving 'multiple' reports of him aggressively pursuing Brashears, she was contacted, told she violated the Patriot Act by Big O Tires?!! Received letters from the above and harassed for years. Colorado Workers compensation is so corrupt this may be my last post. She was immediately framed , blamed, porn smeared and stalked. Denied medical care , when received died on surgery table, revised and disabled. Even the mafia would  tackle only the associates bringing undue negative attention to their  own organization.",
          "modified": "2023-12-16T15:00:49.451000",
          "created": "2023-11-16T17:35:50.285000",
          "tags": [
            "whois record",
            "ssl certificate",
            "whois whois",
            "communicating",
            "referrer",
            "ip address",
            "contacted",
            "pe resource",
            "historical ssl",
            "collections wow",
            "cobalt",
            "stealer",
            "quasar",
            "remcos",
            "ursnif",
            "fabookie",
            "name verdict",
            "exit",
            "node tcp",
            "traffic",
            "united",
            "et tor",
            "known tor",
            "relayrouter",
            "anonymizer",
            "tor known",
            "tor relayrouter",
            "cisco umbrella",
            "site",
            "safe site",
            "heur",
            "maltiverse",
            "million",
            "alexa top",
            "unsafe",
            "html",
            "team",
            "riskware",
            "malware",
            "phishing",
            "union",
            "bank",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "swrort",
            "adaptivebee",
            "unruy",
            "iobit",
            "dropper",
            "trojanx",
            "artemis",
            "installcore",
            "webshell",
            "exploit",
            "crack",
            "webtoolbar",
            "detection list",
            "blacklist http",
            "september",
            "threat roundup",
            "execution",
            "metro",
            "formbook",
            "kgs0",
            "kls0",
            "blacklist https",
            "malicious site",
            "malware site",
            "phishing site",
            "download",
            "malicious",
            "azorult",
            "service",
            "runescape",
            "facebook",
            "genkryptik",
            "fuery",
            "wacatac",
            "alexa",
            "dbatloader",
            "nanocore rat",
            "agent tesla",
            "binder",
            "dridex",
            "hawkeye",
            "small",
            "netwire",
            "trojan",
            "redline stealer",
            "lumma stealer",
            "trojanspy",
            "redline",
            "lumma",
            "tsara brashears",
            "whois",
            "asn owner",
            "highly targeted",
            "relacionada",
            "lolkek",
            "emotet",
            "dark power",
            "wiper",
            "ransomware",
            "cobalt strike",
            "quasar rat",
            "core",
            "bitrat",
            "hacktool",
            "critical",
            "copy",
            "installer",
            "meta",
            "as15169 google",
            "aaaa",
            "a domains",
            "videosdewebcams",
            "search",
            "passive dns",
            "urls",
            "record value",
            "date",
            "certificate",
            "scan endpoints",
            "all octoseek",
            "pulse pulses",
            "files"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Germany"
          ],
          "malware_families": [
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            },
            {
              "id": "Lumma",
              "display_name": "Lumma",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1090",
              "name": "Proxy",
              "display_name": "T1090 - Proxy"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 100,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 204,
            "FileHash-SHA1": 182,
            "FileHash-SHA256": 6268,
            "URL": 13989,
            "domain": 3229,
            "hostname": 4412,
            "CVE": 19,
            "email": 3
          },
          "indicator_count": 28306,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 224,
          "modified_text": "855 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "655686e2c072557f03e9cba2",
          "name": "https://myaccount.uscis.gov/                         [pulse created by Octoseek]",
          "description": "",
          "modified": "2023-12-16T15:00:49.451000",
          "created": "2023-11-16T21:17:22.087000",
          "tags": [
            "whois record",
            "ssl certificate",
            "whois whois",
            "communicating",
            "referrer",
            "ip address",
            "contacted",
            "pe resource",
            "historical ssl",
            "collections wow",
            "cobalt",
            "stealer",
            "quasar",
            "remcos",
            "ursnif",
            "fabookie",
            "name verdict",
            "exit",
            "node tcp",
            "traffic",
            "united",
            "et tor",
            "known tor",
            "relayrouter",
            "anonymizer",
            "tor known",
            "tor relayrouter",
            "cisco umbrella",
            "site",
            "safe site",
            "heur",
            "maltiverse",
            "million",
            "alexa top",
            "unsafe",
            "html",
            "team",
            "riskware",
            "malware",
            "phishing",
            "union",
            "bank",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "swrort",
            "adaptivebee",
            "unruy",
            "iobit",
            "dropper",
            "trojanx",
            "artemis",
            "installcore",
            "webshell",
            "exploit",
            "crack",
            "webtoolbar",
            "detection list",
            "blacklist http",
            "september",
            "threat roundup",
            "execution",
            "metro",
            "formbook",
            "kgs0",
            "kls0",
            "blacklist https",
            "malicious site",
            "malware site",
            "phishing site",
            "download",
            "malicious",
            "azorult",
            "service",
            "runescape",
            "facebook",
            "genkryptik",
            "fuery",
            "wacatac",
            "alexa",
            "dbatloader",
            "nanocore rat",
            "agent tesla",
            "binder",
            "dridex",
            "hawkeye",
            "small",
            "netwire",
            "trojan",
            "redline stealer",
            "lumma stealer",
            "trojanspy",
            "redline",
            "lumma",
            "tsara brashears",
            "whois",
            "asn owner",
            "highly targeted",
            "relacionada",
            "lolkek",
            "emotet",
            "dark power",
            "wiper",
            "ransomware",
            "cobalt strike",
            "quasar rat",
            "core",
            "bitrat",
            "hacktool",
            "critical",
            "copy",
            "installer",
            "meta",
            "as15169 google",
            "aaaa",
            "a domains",
            "videosdewebcams",
            "search",
            "passive dns",
            "urls",
            "record value",
            "date",
            "certificate",
            "scan endpoints",
            "all octoseek",
            "pulse pulses",
            "files"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Germany"
          ],
          "malware_families": [
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            },
            {
              "id": "Lumma",
              "display_name": "Lumma",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1090",
              "name": "Proxy",
              "display_name": "T1090 - Proxy"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "655650c9b2be6cc930c92cf3",
          "export_count": 102,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 204,
            "FileHash-SHA1": 182,
            "FileHash-SHA256": 6268,
            "URL": 13989,
            "domain": 3229,
            "hostname": 4412,
            "CVE": 19,
            "email": 3
          },
          "indicator_count": 28306,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 225,
          "modified_text": "855 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "655657ca2e402d4f98283de9",
          "name": "https://myaccount.uscis.gov/ ",
          "description": "",
          "modified": "2023-12-16T15:00:49.451000",
          "created": "2023-11-16T17:56:26.312000",
          "tags": [
            "whois record",
            "ssl certificate",
            "whois whois",
            "communicating",
            "referrer",
            "ip address",
            "contacted",
            "pe resource",
            "historical ssl",
            "collections wow",
            "cobalt",
            "stealer",
            "quasar",
            "remcos",
            "ursnif",
            "fabookie",
            "name verdict",
            "exit",
            "node tcp",
            "traffic",
            "united",
            "et tor",
            "known tor",
            "relayrouter",
            "anonymizer",
            "tor known",
            "tor relayrouter",
            "cisco umbrella",
            "site",
            "safe site",
            "heur",
            "maltiverse",
            "million",
            "alexa top",
            "unsafe",
            "html",
            "team",
            "riskware",
            "malware",
            "phishing",
            "union",
            "bank",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "swrort",
            "adaptivebee",
            "unruy",
            "iobit",
            "dropper",
            "trojanx",
            "artemis",
            "installcore",
            "webshell",
            "exploit",
            "crack",
            "webtoolbar",
            "detection list",
            "blacklist http",
            "september",
            "threat roundup",
            "execution",
            "metro",
            "formbook",
            "kgs0",
            "kls0",
            "blacklist https",
            "malicious site",
            "malware site",
            "phishing site",
            "download",
            "malicious",
            "azorult",
            "service",
            "runescape",
            "facebook",
            "genkryptik",
            "fuery",
            "wacatac",
            "alexa",
            "dbatloader",
            "nanocore rat",
            "agent tesla",
            "binder",
            "dridex",
            "hawkeye",
            "small",
            "netwire",
            "trojan",
            "redline stealer",
            "lumma stealer",
            "trojanspy",
            "redline",
            "lumma",
            "tsara brashears",
            "whois",
            "asn owner",
            "highly targeted",
            "relacionada",
            "lolkek",
            "emotet",
            "dark power",
            "wiper",
            "ransomware",
            "cobalt strike",
            "quasar rat",
            "core",
            "bitrat",
            "hacktool",
            "critical",
            "copy",
            "installer",
            "meta",
            "as15169 google",
            "aaaa",
            "a domains",
            "videosdewebcams",
            "search",
            "passive dns",
            "urls",
            "record value",
            "date",
            "certificate",
            "scan endpoints",
            "all octoseek",
            "pulse pulses",
            "files"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Germany"
          ],
          "malware_families": [
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            },
            {
              "id": "Lumma",
              "display_name": "Lumma",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1090",
              "name": "Proxy",
              "display_name": "T1090 - Proxy"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "655650c9b2be6cc930c92cf3",
          "export_count": 100,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 204,
            "FileHash-SHA1": 182,
            "FileHash-SHA256": 6268,
            "URL": 13989,
            "domain": 3229,
            "hostname": 4412,
            "CVE": 19,
            "email": 3
          },
          "indicator_count": 28306,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "855 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65565477da453c46f05a6ac4",
          "name": "BTW VirusTotal - \" interesting files written to disk during execution'",
          "description": "",
          "modified": "2023-12-16T15:00:49.451000",
          "created": "2023-11-16T17:42:15.123000",
          "tags": [
            "whois record",
            "ssl certificate",
            "whois whois",
            "communicating",
            "referrer",
            "ip address",
            "contacted",
            "pe resource",
            "historical ssl",
            "collections wow",
            "cobalt",
            "stealer",
            "quasar",
            "remcos",
            "ursnif",
            "fabookie",
            "name verdict",
            "exit",
            "node tcp",
            "traffic",
            "united",
            "et tor",
            "known tor",
            "relayrouter",
            "anonymizer",
            "tor known",
            "tor relayrouter",
            "cisco umbrella",
            "site",
            "safe site",
            "heur",
            "maltiverse",
            "million",
            "alexa top",
            "unsafe",
            "html",
            "team",
            "riskware",
            "malware",
            "phishing",
            "union",
            "bank",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "swrort",
            "adaptivebee",
            "unruy",
            "iobit",
            "dropper",
            "trojanx",
            "artemis",
            "installcore",
            "webshell",
            "exploit",
            "crack",
            "webtoolbar",
            "detection list",
            "blacklist http",
            "september",
            "threat roundup",
            "execution",
            "metro",
            "formbook",
            "kgs0",
            "kls0",
            "blacklist https",
            "malicious site",
            "malware site",
            "phishing site",
            "download",
            "malicious",
            "azorult",
            "service",
            "runescape",
            "facebook",
            "genkryptik",
            "fuery",
            "wacatac",
            "alexa",
            "dbatloader",
            "nanocore rat",
            "agent tesla",
            "binder",
            "dridex",
            "hawkeye",
            "small",
            "netwire",
            "trojan",
            "redline stealer",
            "lumma stealer",
            "trojanspy",
            "redline",
            "lumma",
            "tsara brashears",
            "whois",
            "asn owner",
            "highly targeted",
            "relacionada",
            "lolkek",
            "emotet",
            "dark power",
            "wiper",
            "ransomware",
            "cobalt strike",
            "quasar rat",
            "core",
            "bitrat",
            "hacktool",
            "critical",
            "copy",
            "installer",
            "meta",
            "as15169 google",
            "aaaa",
            "a domains",
            "videosdewebcams",
            "search",
            "passive dns",
            "urls",
            "record value",
            "date",
            "certificate",
            "scan endpoints",
            "all octoseek",
            "pulse pulses",
            "files"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Germany"
          ],
          "malware_families": [
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            },
            {
              "id": "Lumma",
              "display_name": "Lumma",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1090",
              "name": "Proxy",
              "display_name": "T1090 - Proxy"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "655650c9b2be6cc930c92cf3",
          "export_count": 101,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 204,
            "FileHash-SHA1": 182,
            "FileHash-SHA256": 6268,
            "URL": 13989,
            "domain": 3229,
            "hostname": 4412,
            "CVE": 19,
            "email": 3
          },
          "indicator_count": 28306,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 223,
          "modified_text": "855 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "655650c9b2be6cc930c92cf3",
          "name": "https://myaccount.uscis.gov/",
          "description": "HOW!?!? My device was remotely logged into this account somehow.\nThis is egregious. Silence  Threats. I have no connection to this but was contacted by a while ago. I don't know how or why a part of the government would attack a person with a TBI and C1 - S1 Spinal cord injury allegedly caused by Colorado physical therapist and protect him. Why  is victim, tracked and unsafe, receiving death threats, monitored, denied medical care, stalked EVERYWHERE.   \nEven felons aren't monitored for life. STOP.\nWill this get us killed. Do the right thing.\nGod bless America, purge the government.\nThe truth should set you fee not get you harmed.",
          "modified": "2023-12-16T15:00:49.451000",
          "created": "2023-11-16T17:26:33",
          "tags": [
            "whois record",
            "ssl certificate",
            "whois whois",
            "communicating",
            "referrer",
            "ip address",
            "contacted",
            "pe resource",
            "historical ssl",
            "collections wow",
            "cobalt",
            "stealer",
            "quasar",
            "remcos",
            "ursnif",
            "fabookie",
            "name verdict",
            "exit",
            "node tcp",
            "traffic",
            "united",
            "et tor",
            "known tor",
            "relayrouter",
            "anonymizer",
            "tor known",
            "tor relayrouter",
            "cisco umbrella",
            "site",
            "safe site",
            "heur",
            "maltiverse",
            "million",
            "alexa top",
            "unsafe",
            "html",
            "team",
            "riskware",
            "malware",
            "phishing",
            "union",
            "bank",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "swrort",
            "adaptivebee",
            "unruy",
            "iobit",
            "dropper",
            "trojanx",
            "artemis",
            "installcore",
            "webshell",
            "exploit",
            "crack",
            "webtoolbar",
            "detection list",
            "blacklist http",
            "september",
            "threat roundup",
            "execution",
            "metro",
            "formbook",
            "kgs0",
            "kls0",
            "blacklist https",
            "malicious site",
            "malware site",
            "phishing site",
            "download",
            "malicious",
            "azorult",
            "service",
            "runescape",
            "facebook",
            "genkryptik",
            "fuery",
            "wacatac",
            "alexa",
            "dbatloader",
            "nanocore rat",
            "agent tesla",
            "binder",
            "dridex",
            "hawkeye",
            "small",
            "netwire",
            "trojan",
            "redline stealer",
            "lumma stealer",
            "trojanspy",
            "redline",
            "lumma",
            "tsara brashears",
            "whois",
            "asn owner",
            "highly targeted",
            "relacionada",
            "lolkek",
            "emotet",
            "dark power",
            "wiper",
            "ransomware",
            "cobalt strike",
            "quasar rat",
            "core",
            "bitrat",
            "hacktool",
            "critical",
            "copy",
            "installer",
            "meta",
            "as15169 google",
            "aaaa",
            "a domains",
            "videosdewebcams",
            "search",
            "passive dns",
            "urls",
            "record value",
            "date",
            "certificate",
            "scan endpoints",
            "all octoseek",
            "pulse pulses",
            "files"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Germany"
          ],
          "malware_families": [
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            },
            {
              "id": "Lumma",
              "display_name": "Lumma",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1090",
              "name": "Proxy",
              "display_name": "T1090 - Proxy"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 102,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 204,
            "FileHash-SHA1": 182,
            "FileHash-SHA256": 6268,
            "URL": 13989,
            "domain": 3229,
            "hostname": 4412,
            "CVE": 19,
            "email": 3
          },
          "indicator_count": 28306,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 224,
          "modified_text": "855 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65580c52bf98f256b6a01da6",
          "name": "https://myaccount.uscis.gov/",
          "description": "",
          "modified": "2023-12-16T15:00:49.451000",
          "created": "2023-11-18T00:58:58.944000",
          "tags": [
            "whois record",
            "ssl certificate",
            "whois whois",
            "communicating",
            "referrer",
            "ip address",
            "contacted",
            "pe resource",
            "historical ssl",
            "collections wow",
            "cobalt",
            "stealer",
            "quasar",
            "remcos",
            "ursnif",
            "fabookie",
            "name verdict",
            "exit",
            "node tcp",
            "traffic",
            "united",
            "et tor",
            "known tor",
            "relayrouter",
            "anonymizer",
            "tor known",
            "tor relayrouter",
            "cisco umbrella",
            "site",
            "safe site",
            "heur",
            "maltiverse",
            "million",
            "alexa top",
            "unsafe",
            "html",
            "team",
            "riskware",
            "malware",
            "phishing",
            "union",
            "bank",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "swrort",
            "adaptivebee",
            "unruy",
            "iobit",
            "dropper",
            "trojanx",
            "artemis",
            "installcore",
            "webshell",
            "exploit",
            "crack",
            "webtoolbar",
            "detection list",
            "blacklist http",
            "september",
            "threat roundup",
            "execution",
            "metro",
            "formbook",
            "kgs0",
            "kls0",
            "blacklist https",
            "malicious site",
            "malware site",
            "phishing site",
            "download",
            "malicious",
            "azorult",
            "service",
            "runescape",
            "facebook",
            "genkryptik",
            "fuery",
            "wacatac",
            "alexa",
            "dbatloader",
            "nanocore rat",
            "agent tesla",
            "binder",
            "dridex",
            "hawkeye",
            "small",
            "netwire",
            "trojan",
            "redline stealer",
            "lumma stealer",
            "trojanspy",
            "redline",
            "lumma",
            "tsara brashears",
            "whois",
            "asn owner",
            "highly targeted",
            "relacionada",
            "lolkek",
            "emotet",
            "dark power",
            "wiper",
            "ransomware",
            "cobalt strike",
            "quasar rat",
            "core",
            "bitrat",
            "hacktool",
            "critical",
            "copy",
            "installer",
            "meta",
            "as15169 google",
            "aaaa",
            "a domains",
            "videosdewebcams",
            "search",
            "passive dns",
            "urls",
            "record value",
            "date",
            "certificate",
            "scan endpoints",
            "all octoseek",
            "pulse pulses",
            "files"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Germany"
          ],
          "malware_families": [
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            },
            {
              "id": "Lumma",
              "display_name": "Lumma",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1090",
              "name": "Proxy",
              "display_name": "T1090 - Proxy"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "655650c9b2be6cc930c92cf3",
          "export_count": 101,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 204,
            "FileHash-SHA1": 182,
            "FileHash-SHA256": 6268,
            "URL": 13989,
            "domain": 3229,
            "hostname": 4412,
            "CVE": 19,
            "email": 3
          },
          "indicator_count": 28306,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 226,
          "modified_text": "855 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "656aac25a8a2caaddf0d3b88",
          "name": "https://myaccount.uscis.gov/",
          "description": "",
          "modified": "2023-12-16T15:00:49.451000",
          "created": "2023-12-02T04:01:41.427000",
          "tags": [
            "whois record",
            "ssl certificate",
            "whois whois",
            "communicating",
            "referrer",
            "ip address",
            "contacted",
            "pe resource",
            "historical ssl",
            "collections wow",
            "cobalt",
            "stealer",
            "quasar",
            "remcos",
            "ursnif",
            "fabookie",
            "name verdict",
            "exit",
            "node tcp",
            "traffic",
            "united",
            "et tor",
            "known tor",
            "relayrouter",
            "anonymizer",
            "tor known",
            "tor relayrouter",
            "cisco umbrella",
            "site",
            "safe site",
            "heur",
            "maltiverse",
            "million",
            "alexa top",
            "unsafe",
            "html",
            "team",
            "riskware",
            "malware",
            "phishing",
            "union",
            "bank",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "swrort",
            "adaptivebee",
            "unruy",
            "iobit",
            "dropper",
            "trojanx",
            "artemis",
            "installcore",
            "webshell",
            "exploit",
            "crack",
            "webtoolbar",
            "detection list",
            "blacklist http",
            "september",
            "threat roundup",
            "execution",
            "metro",
            "formbook",
            "kgs0",
            "kls0",
            "blacklist https",
            "malicious site",
            "malware site",
            "phishing site",
            "download",
            "malicious",
            "azorult",
            "service",
            "runescape",
            "facebook",
            "genkryptik",
            "fuery",
            "wacatac",
            "alexa",
            "dbatloader",
            "nanocore rat",
            "agent tesla",
            "binder",
            "dridex",
            "hawkeye",
            "small",
            "netwire",
            "trojan",
            "redline stealer",
            "lumma stealer",
            "trojanspy",
            "redline",
            "lumma",
            "tsara brashears",
            "whois",
            "asn owner",
            "highly targeted",
            "relacionada",
            "lolkek",
            "emotet",
            "dark power",
            "wiper",
            "ransomware",
            "cobalt strike",
            "quasar rat",
            "core",
            "bitrat",
            "hacktool",
            "critical",
            "copy",
            "installer",
            "meta",
            "as15169 google",
            "aaaa",
            "a domains",
            "videosdewebcams",
            "search",
            "passive dns",
            "urls",
            "record value",
            "date",
            "certificate",
            "scan endpoints",
            "all octoseek",
            "pulse pulses",
            "files"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Germany"
          ],
          "malware_families": [
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            },
            {
              "id": "Lumma",
              "display_name": "Lumma",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1090",
              "name": "Proxy",
              "display_name": "T1090 - Proxy"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "655652f6ddcbf952a599cded",
          "export_count": 93,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 204,
            "FileHash-SHA1": 182,
            "FileHash-SHA256": 6268,
            "URL": 13989,
            "domain": 3229,
            "hostname": 4412,
            "CVE": 19,
            "email": 3
          },
          "indicator_count": 28306,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 227,
          "modified_text": "855 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65568d67bd96e06ab44b9b95",
          "name": "TrojanDownloader:Win32/Cutwail.BS/Win.Trojan.Pushdo-20",
          "description": "",
          "modified": "2023-12-14T12:03:15.957000",
          "created": "2023-11-16T21:45:11.721000",
          "tags": [
            "passive dns",
            "urls",
            "t1604023287",
            "scan endpoints",
            "all search",
            "otx octoseek",
            "url http",
            "pulse pulses",
            "http",
            "ip address",
            "ssl certificate",
            "whois record",
            "resolutions",
            "referrer",
            "historical ssl",
            "communicating",
            "threat roundup",
            "whois whois",
            "apple",
            "stopransomware",
            "core",
            "discord",
            "metro",
            "blister",
            "cobalt strike",
            "hacktool",
            "june",
            "name verdict",
            "pattern match",
            "et tor",
            "known tor",
            "misc attack",
            "link",
            "woff2",
            "relayrouter",
            "exit",
            "node traffic",
            "ascii text",
            "date",
            "click",
            "unknown",
            "meta",
            "hybrid",
            "general",
            "local",
            "strings",
            "class",
            "generator",
            "critical",
            "error",
            "execution",
            "malware",
            "network",
            "roblox",
            "united",
            "as13335",
            "a domains",
            "status",
            "aaaa",
            "search",
            "script urls",
            "creation date",
            "showing",
            "pixel",
            "win32",
            "download",
            "t1507537243"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Roblox",
              "display_name": "Roblox",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "65536bdc3676a40633a619be",
          "export_count": 25,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 11333,
            "FileHash-MD5": 81,
            "FileHash-SHA1": 74,
            "FileHash-SHA256": 3269,
            "domain": 2748,
            "hostname": 3475,
            "email": 2,
            "CVE": 2
          },
          "indicator_count": 20984,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 225,
          "modified_text": "857 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65536bdc3676a40633a619be",
          "name": "TrojanDownloader:Win32/Cutwail.BS/Win.Trojan.Pushdo-20",
          "description": "backdoor,trojan downloaders, networm, phishing, tracking, spyware, device commands...",
          "modified": "2023-12-14T12:03:15.957000",
          "created": "2023-11-14T12:45:16.667000",
          "tags": [
            "passive dns",
            "urls",
            "t1604023287",
            "scan endpoints",
            "all search",
            "otx octoseek",
            "url http",
            "pulse pulses",
            "http",
            "ip address",
            "ssl certificate",
            "whois record",
            "resolutions",
            "referrer",
            "historical ssl",
            "communicating",
            "threat roundup",
            "whois whois",
            "apple",
            "stopransomware",
            "core",
            "discord",
            "metro",
            "blister",
            "cobalt strike",
            "hacktool",
            "june",
            "name verdict",
            "pattern match",
            "et tor",
            "known tor",
            "misc attack",
            "link",
            "woff2",
            "relayrouter",
            "exit",
            "node traffic",
            "ascii text",
            "date",
            "click",
            "unknown",
            "meta",
            "hybrid",
            "general",
            "local",
            "strings",
            "class",
            "generator",
            "critical",
            "error",
            "execution",
            "malware",
            "network",
            "roblox",
            "united",
            "as13335",
            "a domains",
            "status",
            "aaaa",
            "search",
            "script urls",
            "creation date",
            "showing",
            "pixel",
            "win32",
            "download",
            "t1507537243"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Roblox",
              "display_name": "Roblox",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 35,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 11333,
            "FileHash-MD5": 81,
            "FileHash-SHA1": 74,
            "FileHash-SHA256": 3269,
            "domain": 2748,
            "hostname": 3475,
            "email": 2,
            "CVE": 2
          },
          "indicator_count": 20984,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 222,
          "modified_text": "857 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65536bc6301b7cdf7d04e095",
          "name": "TrojanDownloader:Win32/Cutwail.BS/Win.Trojan.Pushdo-20",
          "description": "backdoor,trojan downloaders, networm, phishing, tracking, spyware, device commands...",
          "modified": "2023-12-14T12:03:15.957000",
          "created": "2023-11-14T12:44:54.422000",
          "tags": [
            "passive dns",
            "urls",
            "t1604023287",
            "scan endpoints",
            "all search",
            "otx octoseek",
            "url http",
            "pulse pulses",
            "http",
            "ip address",
            "ssl certificate",
            "whois record",
            "resolutions",
            "referrer",
            "historical ssl",
            "communicating",
            "threat roundup",
            "whois whois",
            "apple",
            "stopransomware",
            "core",
            "discord",
            "metro",
            "blister",
            "cobalt strike",
            "hacktool",
            "june",
            "name verdict",
            "pattern match",
            "et tor",
            "known tor",
            "misc attack",
            "link",
            "woff2",
            "relayrouter",
            "exit",
            "node traffic",
            "ascii text",
            "date",
            "click",
            "unknown",
            "meta",
            "hybrid",
            "general",
            "local",
            "strings",
            "class",
            "generator",
            "critical",
            "error",
            "execution",
            "malware",
            "network",
            "roblox",
            "united",
            "as13335",
            "a domains",
            "status",
            "aaaa",
            "search",
            "script urls",
            "creation date",
            "showing",
            "pixel",
            "win32",
            "download",
            "t1507537243"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Roblox",
              "display_name": "Roblox",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 29,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 11333,
            "FileHash-MD5": 81,
            "FileHash-SHA1": 74,
            "FileHash-SHA256": 3269,
            "domain": 2748,
            "hostname": 3475,
            "email": 2,
            "CVE": 2
          },
          "indicator_count": 20984,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 222,
          "modified_text": "857 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a581b1024ea61979da96",
          "name": "Quasar - Dark Web Instagram Account | Link found | Remote Access Trojan (RAT)",
          "description": "",
          "modified": "2023-12-06T16:46:57.782000",
          "created": "2023-12-06T16:46:57.782000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 3,
            "FileHash-SHA256": 5791,
            "hostname": 3255,
            "domain": 2317,
            "FileHash-MD5": 44,
            "FileHash-SHA1": 34,
            "URL": 11513
          },
          "indicator_count": 22957,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 111,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65434be777ef1ef67cc786f8",
          "name": "Home finders rentals",
          "description": "",
          "modified": "2023-12-02T07:04:02.851000",
          "created": "2023-11-02T07:12:38.252000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 11,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "ellenmmm",
            "id": "233693",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 300,
            "domain": 334,
            "FileHash-MD5": 240,
            "FileHash-SHA1": 240,
            "FileHash-SHA256": 1336,
            "URL": 1203,
            "email": 1,
            "CVE": 1
          },
          "indicator_count": 3655,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 82,
          "modified_text": "869 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "656a980f14b5a32303bf865b",
          "name": "CNC server.telegrafix.com",
          "description": "",
          "modified": "2023-12-02T02:35:59.820000",
          "created": "2023-12-02T02:35:59.820000",
          "tags": [
            "record type",
            "ttl value",
            "data",
            "v3 serial",
            "number",
            "issuer",
            "cus cnr3",
            "olet",
            "subject public",
            "key info",
            "key algorithm",
            "key identifier",
            "server",
            "whois lookup",
            "creation date",
            "dnssec",
            "domain name",
            "status",
            "abuse contact",
            "email",
            "registrar abuse",
            "contact phone",
            "date",
            "whois lookups",
            "iana id",
            "domain status",
            "registrar url",
            "registrar whois",
            "first",
            "execution",
            "tsara brashears",
            "ssl certificate",
            "april",
            "threat roundup",
            "october",
            "december",
            "roundup",
            "september",
            "whois record",
            "blustealer",
            "raspberry robin",
            "redline stealer",
            "gopuram",
            "hacktool",
            "skynet",
            "android",
            "quasar",
            "download",
            "malware",
            "hijacker",
            "monitoring",
            "installer",
            "ermac",
            "attack",
            "blackguard",
            "core",
            "awful",
            "twitter",
            "agent tesla",
            "trickbot",
            "ursnif",
            "chaos",
            "metasploit",
            "formbook",
            "metro",
            "name verdict",
            "exit",
            "traffic",
            "node tcp",
            "et tor",
            "known tor",
            "relayrouter",
            "united",
            "team malware",
            "firehol et",
            "tor known",
            "redline",
            "detection list",
            "cisco umbrella",
            "site",
            "safe site",
            "alexa top",
            "million",
            "malicious url",
            "blacklist",
            "phishing",
            "union",
            "team",
            "bank",
            "unsafe",
            "contacted",
            "bundled",
            "project",
            "ransomexx"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Lithuania"
          ],
          "malware_families": [
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            }
          ],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": "65423978ca5e5c9931b586a5",
          "export_count": 12,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 3674,
            "domain": 1422,
            "FileHash-SHA1": 117,
            "FileHash-SHA256": 3178,
            "URL": 8884,
            "email": 2,
            "CVE": 3,
            "FileHash-MD5": 167
          },
          "indicator_count": 17447,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 224,
          "modified_text": "869 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "656a978cf39ec3cdc99278cc",
          "name": "RedLine",
          "description": "",
          "modified": "2023-12-02T02:33:48.848000",
          "created": "2023-12-02T02:33:48.848000",
          "tags": [
            "record type",
            "ttl value",
            "data",
            "v3 serial",
            "number",
            "issuer",
            "cus cnr3",
            "olet",
            "subject public",
            "key info",
            "key algorithm",
            "key identifier",
            "server",
            "whois lookup",
            "creation date",
            "dnssec",
            "domain name",
            "status",
            "abuse contact",
            "email",
            "registrar abuse",
            "contact phone",
            "date",
            "whois lookups",
            "iana id",
            "domain status",
            "registrar url",
            "registrar whois",
            "first",
            "execution",
            "tsara brashears",
            "ssl certificate",
            "april",
            "threat roundup",
            "october",
            "december",
            "roundup",
            "september",
            "whois record",
            "blustealer",
            "raspberry robin",
            "redline stealer",
            "gopuram",
            "hacktool",
            "skynet",
            "android",
            "quasar",
            "download",
            "malware",
            "hijacker",
            "monitoring",
            "installer",
            "ermac",
            "attack",
            "blackguard",
            "core",
            "awful",
            "twitter",
            "agent tesla",
            "trickbot",
            "ursnif",
            "chaos",
            "metasploit",
            "formbook",
            "metro",
            "name verdict",
            "exit",
            "traffic",
            "node tcp",
            "et tor",
            "known tor",
            "relayrouter",
            "united",
            "team malware",
            "firehol et",
            "tor known",
            "redline",
            "detection list",
            "cisco umbrella",
            "site",
            "safe site",
            "alexa top",
            "million",
            "malicious url",
            "blacklist",
            "phishing",
            "union",
            "team",
            "bank",
            "unsafe",
            "contacted",
            "bundled",
            "project",
            "ransomexx"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Lithuania"
          ],
          "malware_families": [
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            }
          ],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": "65423a941aa6527fbbe40a53",
          "export_count": 13,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 3674,
            "domain": 1422,
            "FileHash-SHA1": 117,
            "FileHash-SHA256": 3178,
            "URL": 8884,
            "email": 2,
            "CVE": 3,
            "FileHash-MD5": 167
          },
          "indicator_count": 17447,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 226,
          "modified_text": "869 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6545a281ce7426288033f81e",
          "name": "CNC server.telegrafix.com",
          "description": "",
          "modified": "2023-12-01T10:01:56.921000",
          "created": "2023-11-04T01:46:41.933000",
          "tags": [
            "record type",
            "ttl value",
            "data",
            "v3 serial",
            "number",
            "issuer",
            "cus cnr3",
            "olet",
            "subject public",
            "key info",
            "key algorithm",
            "key identifier",
            "server",
            "whois lookup",
            "creation date",
            "dnssec",
            "domain name",
            "status",
            "abuse contact",
            "email",
            "registrar abuse",
            "contact phone",
            "date",
            "whois lookups",
            "iana id",
            "domain status",
            "registrar url",
            "registrar whois",
            "first",
            "execution",
            "tsara brashears",
            "ssl certificate",
            "april",
            "threat roundup",
            "october",
            "december",
            "roundup",
            "september",
            "whois record",
            "blustealer",
            "raspberry robin",
            "redline stealer",
            "gopuram",
            "hacktool",
            "skynet",
            "android",
            "quasar",
            "download",
            "malware",
            "hijacker",
            "monitoring",
            "installer",
            "ermac",
            "attack",
            "blackguard",
            "core",
            "awful",
            "twitter",
            "agent tesla",
            "trickbot",
            "ursnif",
            "chaos",
            "metasploit",
            "formbook",
            "metro",
            "name verdict",
            "exit",
            "traffic",
            "node tcp",
            "et tor",
            "known tor",
            "relayrouter",
            "united",
            "team malware",
            "firehol et",
            "tor known",
            "redline",
            "detection list",
            "cisco umbrella",
            "site",
            "safe site",
            "alexa top",
            "million",
            "malicious url",
            "blacklist",
            "phishing",
            "union",
            "team",
            "bank",
            "unsafe",
            "contacted",
            "bundled",
            "project",
            "ransomexx"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Lithuania"
          ],
          "malware_families": [
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            }
          ],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": "65423978ca5e5c9931b586a5",
          "export_count": 46,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 3674,
            "domain": 1422,
            "FileHash-SHA1": 117,
            "FileHash-SHA256": 3178,
            "URL": 8884,
            "email": 2,
            "CVE": 3,
            "FileHash-MD5": 167
          },
          "indicator_count": 17447,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 224,
          "modified_text": "870 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65423a941aa6527fbbe40a53",
          "name": "RedLine",
          "description": "CNC server.telegrafix.com. Brute force passwords using SSH on server RELAY\nTargeted individual, monitoring, hacking, CNC, remoted devices, tracking, malware attack,etc.\n(Auto populated: The last HTTPS certificate was signed by the US government's Department of Homeland Security (DHS), but what exactly is it and what does the certificate actually say?. and how does it look?)",
          "modified": "2023-12-01T10:01:56.921000",
          "created": "2023-11-01T11:46:28.418000",
          "tags": [
            "record type",
            "ttl value",
            "data",
            "v3 serial",
            "number",
            "issuer",
            "cus cnr3",
            "olet",
            "subject public",
            "key info",
            "key algorithm",
            "key identifier",
            "server",
            "whois lookup",
            "creation date",
            "dnssec",
            "domain name",
            "status",
            "abuse contact",
            "email",
            "registrar abuse",
            "contact phone",
            "date",
            "whois lookups",
            "iana id",
            "domain status",
            "registrar url",
            "registrar whois",
            "first",
            "execution",
            "tsara brashears",
            "ssl certificate",
            "april",
            "threat roundup",
            "october",
            "december",
            "roundup",
            "september",
            "whois record",
            "blustealer",
            "raspberry robin",
            "redline stealer",
            "gopuram",
            "hacktool",
            "skynet",
            "android",
            "quasar",
            "download",
            "malware",
            "hijacker",
            "monitoring",
            "installer",
            "ermac",
            "attack",
            "blackguard",
            "core",
            "awful",
            "twitter",
            "agent tesla",
            "trickbot",
            "ursnif",
            "chaos",
            "metasploit",
            "formbook",
            "metro",
            "name verdict",
            "exit",
            "traffic",
            "node tcp",
            "et tor",
            "known tor",
            "relayrouter",
            "united",
            "team malware",
            "firehol et",
            "tor known",
            "redline",
            "detection list",
            "cisco umbrella",
            "site",
            "safe site",
            "alexa top",
            "million",
            "malicious url",
            "blacklist",
            "phishing",
            "union",
            "team",
            "bank",
            "unsafe",
            "contacted",
            "bundled",
            "project",
            "ransomexx"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Lithuania"
          ],
          "malware_families": [
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            }
          ],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 45,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 3674,
            "domain": 1422,
            "FileHash-SHA1": 117,
            "FileHash-SHA256": 3178,
            "URL": 8884,
            "email": 2,
            "CVE": 3,
            "FileHash-MD5": 167
          },
          "indicator_count": 17447,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 222,
          "modified_text": "870 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65423978ca5e5c9931b586a5",
          "name": "CNC server.telegrafix.com",
          "description": "Brute force passwords using SSH on server RELAY\nTargeted individual, adult content, malvertizing, keylogging, monitoring, hacking, CNC, remoted devices, tracking, malware attack,etc.\n(Auto populated: The last HTTPS certificate was signed by the US government's Department of Homeland Security (DHS), but what exactly is it and what does the certificate actually say?. and how does it look?)",
          "modified": "2023-12-01T10:01:56.921000",
          "created": "2023-11-01T11:41:44.861000",
          "tags": [
            "record type",
            "ttl value",
            "data",
            "v3 serial",
            "number",
            "issuer",
            "cus cnr3",
            "olet",
            "subject public",
            "key info",
            "key algorithm",
            "key identifier",
            "server",
            "whois lookup",
            "creation date",
            "dnssec",
            "domain name",
            "status",
            "abuse contact",
            "email",
            "registrar abuse",
            "contact phone",
            "date",
            "whois lookups",
            "iana id",
            "domain status",
            "registrar url",
            "registrar whois",
            "first",
            "execution",
            "tsara brashears",
            "ssl certificate",
            "april",
            "threat roundup",
            "october",
            "december",
            "roundup",
            "september",
            "whois record",
            "blustealer",
            "raspberry robin",
            "redline stealer",
            "gopuram",
            "hacktool",
            "skynet",
            "android",
            "quasar",
            "download",
            "malware",
            "hijacker",
            "monitoring",
            "installer",
            "ermac",
            "attack",
            "blackguard",
            "core",
            "awful",
            "twitter",
            "agent tesla",
            "trickbot",
            "ursnif",
            "chaos",
            "metasploit",
            "formbook",
            "metro",
            "name verdict",
            "exit",
            "traffic",
            "node tcp",
            "et tor",
            "known tor",
            "relayrouter",
            "united",
            "team malware",
            "firehol et",
            "tor known",
            "redline",
            "detection list",
            "cisco umbrella",
            "site",
            "safe site",
            "alexa top",
            "million",
            "malicious url",
            "blacklist",
            "phishing",
            "union",
            "team",
            "bank",
            "unsafe",
            "contacted",
            "bundled",
            "project",
            "ransomexx"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Lithuania"
          ],
          "malware_families": [
            {
              "id": "RedLine",
              "display_name": "RedLine",
              "target": null
            }
          ],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 42,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 3674,
            "domain": 1422,
            "FileHash-SHA1": 117,
            "FileHash-SHA256": 3178,
            "URL": 8884,
            "email": 2,
            "CVE": 3,
            "FileHash-MD5": 167
          },
          "indicator_count": 17447,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 220,
          "modified_text": "870 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "650a0b7c9a6b3c5d0a2a3960",
          "name": "Quasar - Dark Web Instagram Account | Link found | Remote Access Trojan (RAT)",
          "description": "Link: apple.instagram.com \nQuasar is a lightweight, publicly available open-source Remote Access Trojan (RAT). Used by a variety of attackers.  Typically packed to make analysis of the source demanding.\nAccount appears to have been breached, operational in dark web. Dead host.",
          "modified": "2023-10-19T14:04:37.381000",
          "created": "2023-09-19T20:58:36.137000",
          "tags": [
            "contacted",
            "threat roundup",
            "execution",
            "ssl certificate",
            "dark web",
            "crypto threat",
            "resolutions",
            "referrer",
            "stealer",
            "quasar",
            "asyncrat",
            "error",
            "social engineering",
            "iPhone phishing",
            "Apple phishing",
            "email phishing",
            "emotet",
            "remote",
            "attacks"
          ],
          "references": [
            "Alienvault OTX",
            "Data Analysis",
            "Online Research",
            "WebTools"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "India"
          ],
          "malware_families": [
            {
              "id": "Backdoor:MSIL/AsyncRAT",
              "display_name": "Backdoor:MSIL/AsyncRAT",
              "target": "/malware/Backdoor:MSIL/AsyncRAT"
            },
            {
              "id": "Backdoor:MSIL/QuasarRat",
              "display_name": "Backdoor:MSIL/QuasarRat",
              "target": "/malware/Backdoor:MSIL/QuasarRat"
            }
          ],
          "attack_ids": [
            {
              "id": "T1003",
              "name": "OS Credential Dumping",
              "display_name": "T1003 - OS Credential Dumping"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "T1548",
              "name": "Abuse Elevation Control Mechanism",
              "display_name": "T1548 - Abuse Elevation Control Mechanism"
            }
          ],
          "industries": [
            "Media",
            "Social Media",
            "Technology",
            "Hacking"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 31,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 44,
            "FileHash-SHA1": 34,
            "FileHash-SHA256": 5791,
            "URL": 11513,
            "domain": 2317,
            "hostname": 3255,
            "CVE": 3
          },
          "indicator_count": 22957,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 225,
          "modified_text": "913 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "Data Analysis",
        "WebTools",
        "Alienvault OTX",
        "Online Research"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [],
          "malware_families": [
            "Beach research",
            "Backdoor:msil/asyncrat",
            "Maltiverse",
            "Redline",
            "Roblox",
            "Lumma",
            "Webtoolbar",
            "Backdoor:msil/quasarrat",
            "Trojanspy"
          ],
          "industries": [
            "Medicine",
            "Hacking",
            "Social media",
            "Health",
            "Nutritional",
            "Technology",
            "Medical",
            "Media"
          ],
          "unique_indicators": 136134
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/jqueryapi.info",
    "whois": "http://whois.domaintools.com/jqueryapi.info",
    "domain": "jqueryapi.info",
    "hostname": "bbs.jqueryapi.info"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 24,
  "pulses": [
    {
      "id": "655bb326c4023eb59c1f73b9",
      "name": "WebToolbar",
      "description": "\"Domain Seized - http://server3.elgenero.com/cgi-bin/xdown.cgi\"\nDomain stated ' SEIZED' by Department of Homeland Security is a 'HOAX' \nLink leads to a new domain with same behavior: http://server3.elgenero.com/iprc_seized_banner.png",
      "modified": "2023-12-20T19:02:04.107000",
      "created": "2023-11-20T19:27:34.827000",
      "tags": [
        "no data",
        "tag count",
        "threat report",
        "ip summary",
        "url summary",
        "summary",
        "sample",
        "samples",
        "detection list",
        "blacklist",
        "spammer",
        "firehol",
        "united",
        "anonymizer",
        "team proxy",
        "cyber threat",
        "team http",
        "attacker",
        "maltiverse http",
        "phishing site",
        "malware",
        "team",
        "phishing",
        "malicious",
        "facebook",
        "service",
        "bank",
        "panama",
        "suppobox",
        "asyncrat",
        "cobalt strike",
        "cve201711882",
        "cisco umbrella",
        "heur",
        "site",
        "alexa top",
        "million",
        "safe site",
        "alexa",
        "malicious site",
        "malware site",
        "riskware",
        "exploit",
        "artemis",
        "iframe",
        "unsafe",
        "agent",
        "win64",
        "zbot",
        "fakealert",
        "conduit",
        "crack",
        "back",
        "download",
        "acint",
        "installpack",
        "xtrat",
        "nircmd",
        "psexec",
        "occamy",
        "brontok",
        "zpevdo",
        "startpage",
        "nanocore",
        "keygen",
        "fareit",
        "secrisk",
        "unruy",
        "filetour",
        "installcore",
        "floxif",
        "cleaner",
        "patcher",
        "opencandy",
        "adload",
        "presenoker",
        "wacatac",
        "swrort",
        "fusioncore",
        "pony",
        "applicunwnt",
        "union",
        "webtoolbar",
        "trojanspy",
        "maltiverse",
        "blacklist http",
        "ssl certificate",
        "execution",
        "whois record",
        "contacted",
        "whois whois",
        "historical ssl",
        "communicating",
        "referrer",
        "pe resource",
        "resolutions",
        "hacktool",
        "emotet",
        "agent tesla",
        "love",
        "mirai",
        "satacom",
        "probe",
        "critical",
        "copy",
        "dark power",
        "core",
        "chaos",
        "ransomexx",
        "quasar",
        "malvertizing",
        "spyware",
        "cnc",
        "trojan",
        "phishing",
        "botnetwork",
        "fraud services",
        "defacement",
        "department of homeland security hoax banner",
        "tulach",
        "sabey",
        "targeting",
        "cyber threat",
        "tsara brashears",
        ".gov",
        "dhs",
        "fbi",
        "interpol",
        "doj",
        "nypd",
        "dpd",
        "irs",
        "nsa",
        "cia",
        "soc",
        "hacker"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "WebToolbar",
          "display_name": "WebToolbar",
          "target": null
        },
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 37,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 573,
        "FileHash-SHA1": 327,
        "FileHash-SHA256": 1474,
        "CVE": 20,
        "domain": 546,
        "hostname": 1215,
        "URL": 3249
      },
      "indicator_count": 7404,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 219,
      "modified_text": "851 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6558c481715409563073cb79",
      "name": "Fraud Services",
      "description": "http://kramtechnology.com/, fraud services, network, rat, trojan, phishing, malvertizing, malware hosting, scanning host, archives browser events.",
      "modified": "2023-12-18T05:05:36.760000",
      "created": "2023-11-18T14:04:48.923000",
      "tags": [
        "methodpost",
        "dropped",
        "contacted",
        "ssl certificate",
        "whois record",
        "zva8k4ghshhpcb5",
        "contacted urls",
        "q0gpyr1balpdgpo",
        "historical ssl",
        "page dow",
        "blacklist http",
        "cisco umbrella",
        "site",
        "alexa top",
        "safe site",
        "million",
        "paypal",
        "team phishing",
        "malicious url",
        "alexa",
        "azorult",
        "phishing",
        "service",
        "runescape",
        "facebook",
        "bank",
        "download",
        "malware",
        "united",
        "passive dns",
        "scan endpoints",
        "all search",
        "otx octoseek",
        "ipv4",
        "pulse pulses",
        "urls",
        "files",
        "reverse dns",
        "twitter",
        "log id",
        "gmtn",
        "sectigo rsa",
        "secure server",
        "tls web",
        "salford",
        "sectigo limited",
        "ocsp",
        "false",
        "california",
        "british virgin",
        "locality",
        "d3 a5",
        "url http"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 15,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 14816,
        "FileHash-MD5": 41,
        "FileHash-SHA1": 33,
        "FileHash-SHA256": 5158,
        "domain": 3758,
        "hostname": 2961,
        "email": 4,
        "SSLCertFingerprint": 3,
        "CVE": 3
      },
      "indicator_count": 26777,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 222,
      "modified_text": "853 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65580c17e69371b34a573f72",
      "name": "Masquerading",
      "description": "",
      "modified": "2023-12-17T11:03:45.376000",
      "created": "2023-11-18T00:57:59.619000",
      "tags": [
        "no expiration",
        "filehashsha256",
        "filehashmd5",
        "iocs",
        "url http",
        "expiration",
        "scan endpoints",
        "all search",
        "otx octoseek",
        "create new",
        "blacklist http",
        "laplasclipper",
        "malicious url",
        "cisco umbrella",
        "site",
        "alexa top",
        "blacklist",
        "safe site",
        "malware site",
        "phishing site",
        "malicious site",
        "malware",
        "china unknown",
        "united",
        "unknown",
        "as54994 quantil",
        "cname",
        "nxdomain",
        "as8068",
        "as4134 chinanet",
        "passive dns",
        "domain",
        "next",
        "filehashsha1",
        "service company",
        "servers",
        "ndicator role",
        "title added",
        "active related",
        "pulses url",
        "showing",
        "entries",
        "pulses http",
        "url https",
        "type indicator",
        "role title",
        "added active",
        "related pulses",
        "report spam",
        "author avatar",
        "created",
        "hour ago",
        "trojanspy",
        "redline",
        "pulses hostname",
        "blacklist https",
        "indicator role",
        "bidid",
        "adid",
        "v4us",
        "v51845481",
        "hostname",
        "http",
        "cisco",
        "umbrella rank",
        "search live",
        "api blog",
        "docs pricing",
        "november",
        "de summary",
        "frankfurt",
        "main",
        "reverse dns",
        "general full",
        "asn16509",
        "amazon02",
        "resource",
        "protocol h2",
        "security tls",
        "hash",
        "de indicators",
        "domains",
        "hashes",
        "copyright",
        "gmbh version",
        "follow",
        "value",
        "postitem",
        "variables",
        "parameters",
        "systemid object",
        "def function",
        "login",
        "get h2",
        "secrets llc",
        "agreement",
        "the site",
        "content",
        "policy",
        "this site",
        "claims",
        "florida",
        "please",
        "premium",
        "service",
        "restrict",
        "express",
        "media",
        "facebook",
        "twitter",
        "final",
        "first",
        "cloudflarenet",
        "gts ca",
        "software",
        "million",
        "hours ago",
        "chameleon",
        "heur",
        "phishing",
        "riskware",
        "agent",
        "unsafe",
        "opencandy",
        "exploit",
        "mimikatz",
        "iframe",
        "downldr",
        "presenoker",
        "artemis",
        "download",
        "beach research",
        "germany",
        "asn20940",
        "akamaiasn1",
        "threat report",
        "url summary",
        "summary",
        "sample",
        "samples",
        "detection list",
        "alexa",
        "maltiverse",
        "google",
        "qtsas",
        "name value",
        "no data",
        "tag count",
        "count blacklist",
        "pbiptbmvd0k4",
        "glelexoputyh",
        "suppobox",
        "team",
        "bambernek",
        "internet storm",
        "phishtank",
        "phish",
        "trickbot",
        "telecom",
        "bank",
        "ipv4",
        "octoseek report",
        "spam https",
        "tsara brashears",
        "malvertizing",
        "tracking",
        "tagging",
        "spyder",
        "cybercrime",
        "email collection",
        "apple data collection",
        "win32 exe",
        "ms word",
        "document",
        "type name",
        "javascript",
        "network capture",
        "files",
        "detections type",
        "name",
        "ssl certificate",
        "whois whois",
        "tsara brashears",
        "whois record",
        "asn owner",
        "highly targeted",
        "kgs0",
        "kls0",
        "relacionada",
        "family",
        "lolkek",
        "emotet",
        "dark power",
        "wiper",
        "ransomware",
        "cobalt strike",
        "quasar rat",
        "ursnif",
        "remcos",
        "core",
        "redline stealer",
        "bitrat",
        "hacktool",
        "critical",
        "copy",
        "installer",
        "execution",
        "network",
        "communicating",
        "referrer",
        "parent",
        "historical ssl",
        "siblings",
        "resolutions",
        "name verdict",
        "falcon sandbox",
        "pattern match",
        "error",
        "file",
        "indicator",
        "script",
        "typeof e",
        "ascii text",
        "appdata",
        "date",
        "windir",
        "span",
        "body",
        "meta",
        "class",
        "generator",
        "info",
        "null",
        "refresh",
        "hybrid",
        "general",
        "local",
        "click",
        "strings",
        "tools",
        "look",
        "verify",
        "restart",
        "form",
        "footer",
        "html",
        "union",
        "outbreak",
        "downer",
        "shell",
        "mediamagnet",
        "sality",
        "swrort",
        "adaptivebee",
        "unruy",
        "iobit",
        "dropper",
        "trojanx",
        "installcore",
        "webshell",
        "crack",
        "webtoolbar",
        "threat roundup",
        "contacted",
        "june",
        "july",
        "october",
        "august"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Beach Research",
          "display_name": "Beach Research",
          "target": null
        },
        {
          "id": "Maltiverse",
          "display_name": "Maltiverse",
          "target": null
        },
        {
          "id": "WebToolbar",
          "display_name": "WebToolbar",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1176",
          "name": "Browser Extensions",
          "display_name": "T1176 - Browser Extensions"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1090",
          "name": "Proxy",
          "display_name": "T1090 - Proxy"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1102",
          "name": "Web Service",
          "display_name": "T1102 - Web Service"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1199",
          "name": "Trusted Relationship",
          "display_name": "T1199 - Trusted Relationship"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        }
      ],
      "industries": [
        "Health",
        "Nutritional",
        "Medical",
        "Medicine"
      ],
      "TLP": "white",
      "cloned_from": "65574cb4447c8d87ad85fa75",
      "export_count": 103,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 400,
        "FileHash-SHA1": 240,
        "FileHash-SHA256": 6459,
        "hostname": 4845,
        "URL": 11514,
        "CVE": 15,
        "domain": 3179,
        "email": 31
      },
      "indicator_count": 26683,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 226,
      "modified_text": "854 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65580c1516990d69644fb3d0",
      "name": "Masquerading",
      "description": "",
      "modified": "2023-12-17T11:03:45.376000",
      "created": "2023-11-18T00:57:57.372000",
      "tags": [
        "no expiration",
        "filehashsha256",
        "filehashmd5",
        "iocs",
        "url http",
        "expiration",
        "scan endpoints",
        "all search",
        "otx octoseek",
        "create new",
        "blacklist http",
        "laplasclipper",
        "malicious url",
        "cisco umbrella",
        "site",
        "alexa top",
        "blacklist",
        "safe site",
        "malware site",
        "phishing site",
        "malicious site",
        "malware",
        "china unknown",
        "united",
        "unknown",
        "as54994 quantil",
        "cname",
        "nxdomain",
        "as8068",
        "as4134 chinanet",
        "passive dns",
        "domain",
        "next",
        "filehashsha1",
        "service company",
        "servers",
        "ndicator role",
        "title added",
        "active related",
        "pulses url",
        "showing",
        "entries",
        "pulses http",
        "url https",
        "type indicator",
        "role title",
        "added active",
        "related pulses",
        "report spam",
        "author avatar",
        "created",
        "hour ago",
        "trojanspy",
        "redline",
        "pulses hostname",
        "blacklist https",
        "indicator role",
        "bidid",
        "adid",
        "v4us",
        "v51845481",
        "hostname",
        "http",
        "cisco",
        "umbrella rank",
        "search live",
        "api blog",
        "docs pricing",
        "november",
        "de summary",
        "frankfurt",
        "main",
        "reverse dns",
        "general full",
        "asn16509",
        "amazon02",
        "resource",
        "protocol h2",
        "security tls",
        "hash",
        "de indicators",
        "domains",
        "hashes",
        "copyright",
        "gmbh version",
        "follow",
        "value",
        "postitem",
        "variables",
        "parameters",
        "systemid object",
        "def function",
        "login",
        "get h2",
        "secrets llc",
        "agreement",
        "the site",
        "content",
        "policy",
        "this site",
        "claims",
        "florida",
        "please",
        "premium",
        "service",
        "restrict",
        "express",
        "media",
        "facebook",
        "twitter",
        "final",
        "first",
        "cloudflarenet",
        "gts ca",
        "software",
        "million",
        "hours ago",
        "chameleon",
        "heur",
        "phishing",
        "riskware",
        "agent",
        "unsafe",
        "opencandy",
        "exploit",
        "mimikatz",
        "iframe",
        "downldr",
        "presenoker",
        "artemis",
        "download",
        "beach research",
        "germany",
        "asn20940",
        "akamaiasn1",
        "threat report",
        "url summary",
        "summary",
        "sample",
        "samples",
        "detection list",
        "alexa",
        "maltiverse",
        "google",
        "qtsas",
        "name value",
        "no data",
        "tag count",
        "count blacklist",
        "pbiptbmvd0k4",
        "glelexoputyh",
        "suppobox",
        "team",
        "bambernek",
        "internet storm",
        "phishtank",
        "phish",
        "trickbot",
        "telecom",
        "bank",
        "ipv4",
        "octoseek report",
        "spam https",
        "tsara brashears",
        "malvertizing",
        "tracking",
        "tagging",
        "spyder",
        "cybercrime",
        "email collection",
        "apple data collection",
        "win32 exe",
        "ms word",
        "document",
        "type name",
        "javascript",
        "network capture",
        "files",
        "detections type",
        "name",
        "ssl certificate",
        "whois whois",
        "tsara brashears",
        "whois record",
        "asn owner",
        "highly targeted",
        "kgs0",
        "kls0",
        "relacionada",
        "family",
        "lolkek",
        "emotet",
        "dark power",
        "wiper",
        "ransomware",
        "cobalt strike",
        "quasar rat",
        "ursnif",
        "remcos",
        "core",
        "redline stealer",
        "bitrat",
        "hacktool",
        "critical",
        "copy",
        "installer",
        "execution",
        "network",
        "communicating",
        "referrer",
        "parent",
        "historical ssl",
        "siblings",
        "resolutions",
        "name verdict",
        "falcon sandbox",
        "pattern match",
        "error",
        "file",
        "indicator",
        "script",
        "typeof e",
        "ascii text",
        "appdata",
        "date",
        "windir",
        "span",
        "body",
        "meta",
        "class",
        "generator",
        "info",
        "null",
        "refresh",
        "hybrid",
        "general",
        "local",
        "click",
        "strings",
        "tools",
        "look",
        "verify",
        "restart",
        "form",
        "footer",
        "html",
        "union",
        "outbreak",
        "downer",
        "shell",
        "mediamagnet",
        "sality",
        "swrort",
        "adaptivebee",
        "unruy",
        "iobit",
        "dropper",
        "trojanx",
        "installcore",
        "webshell",
        "crack",
        "webtoolbar",
        "threat roundup",
        "contacted",
        "june",
        "july",
        "october",
        "august"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Beach Research",
          "display_name": "Beach Research",
          "target": null
        },
        {
          "id": "Maltiverse",
          "display_name": "Maltiverse",
          "target": null
        },
        {
          "id": "WebToolbar",
          "display_name": "WebToolbar",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1176",
          "name": "Browser Extensions",
          "display_name": "T1176 - Browser Extensions"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1090",
          "name": "Proxy",
          "display_name": "T1090 - Proxy"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1102",
          "name": "Web Service",
          "display_name": "T1102 - Web Service"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1199",
          "name": "Trusted Relationship",
          "display_name": "T1199 - Trusted Relationship"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        }
      ],
      "industries": [
        "Health",
        "Nutritional",
        "Medical",
        "Medicine"
      ],
      "TLP": "white",
      "cloned_from": "65574cb4447c8d87ad85fa75",
      "export_count": 100,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 400,
        "FileHash-SHA1": 240,
        "FileHash-SHA256": 6459,
        "hostname": 4845,
        "URL": 11514,
        "CVE": 15,
        "domain": 3179,
        "email": 31
      },
      "indicator_count": 26683,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 226,
      "modified_text": "854 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65574cbe6bdbe24ecb170b24",
      "name": "Masquerading",
      "description": "",
      "modified": "2023-12-17T11:03:45.376000",
      "created": "2023-11-17T11:21:34.083000",
      "tags": [
        "no expiration",
        "filehashsha256",
        "filehashmd5",
        "iocs",
        "url http",
        "expiration",
        "scan endpoints",
        "all search",
        "otx octoseek",
        "create new",
        "blacklist http",
        "laplasclipper",
        "malicious url",
        "cisco umbrella",
        "site",
        "alexa top",
        "blacklist",
        "safe site",
        "malware site",
        "phishing site",
        "malicious site",
        "malware",
        "china unknown",
        "united",
        "unknown",
        "as54994 quantil",
        "cname",
        "nxdomain",
        "as8068",
        "as4134 chinanet",
        "passive dns",
        "domain",
        "next",
        "filehashsha1",
        "service company",
        "servers",
        "ndicator role",
        "title added",
        "active related",
        "pulses url",
        "showing",
        "entries",
        "pulses http",
        "url https",
        "type indicator",
        "role title",
        "added active",
        "related pulses",
        "report spam",
        "author avatar",
        "created",
        "hour ago",
        "trojanspy",
        "redline",
        "pulses hostname",
        "blacklist https",
        "indicator role",
        "bidid",
        "adid",
        "v4us",
        "v51845481",
        "hostname",
        "http",
        "cisco",
        "umbrella rank",
        "search live",
        "api blog",
        "docs pricing",
        "november",
        "de summary",
        "frankfurt",
        "main",
        "reverse dns",
        "general full",
        "asn16509",
        "amazon02",
        "resource",
        "protocol h2",
        "security tls",
        "hash",
        "de indicators",
        "domains",
        "hashes",
        "copyright",
        "gmbh version",
        "follow",
        "value",
        "postitem",
        "variables",
        "parameters",
        "systemid object",
        "def function",
        "login",
        "get h2",
        "secrets llc",
        "agreement",
        "the site",
        "content",
        "policy",
        "this site",
        "claims",
        "florida",
        "please",
        "premium",
        "service",
        "restrict",
        "express",
        "media",
        "facebook",
        "twitter",
        "final",
        "first",
        "cloudflarenet",
        "gts ca",
        "software",
        "million",
        "hours ago",
        "chameleon",
        "heur",
        "phishing",
        "riskware",
        "agent",
        "unsafe",
        "opencandy",
        "exploit",
        "mimikatz",
        "iframe",
        "downldr",
        "presenoker",
        "artemis",
        "download",
        "beach research",
        "germany",
        "asn20940",
        "akamaiasn1",
        "threat report",
        "url summary",
        "summary",
        "sample",
        "samples",
        "detection list",
        "alexa",
        "maltiverse",
        "google",
        "qtsas",
        "name value",
        "no data",
        "tag count",
        "count blacklist",
        "pbiptbmvd0k4",
        "glelexoputyh",
        "suppobox",
        "team",
        "bambernek",
        "internet storm",
        "phishtank",
        "phish",
        "trickbot",
        "telecom",
        "bank",
        "ipv4",
        "octoseek report",
        "spam https",
        "tsara brashears",
        "malvertizing",
        "tracking",
        "tagging",
        "spyder",
        "cybercrime",
        "email collection",
        "apple data collection",
        "win32 exe",
        "ms word",
        "document",
        "type name",
        "javascript",
        "network capture",
        "files",
        "detections type",
        "name",
        "ssl certificate",
        "whois whois",
        "tsara brashears",
        "whois record",
        "asn owner",
        "highly targeted",
        "kgs0",
        "kls0",
        "relacionada",
        "family",
        "lolkek",
        "emotet",
        "dark power",
        "wiper",
        "ransomware",
        "cobalt strike",
        "quasar rat",
        "ursnif",
        "remcos",
        "core",
        "redline stealer",
        "bitrat",
        "hacktool",
        "critical",
        "copy",
        "installer",
        "execution",
        "network",
        "communicating",
        "referrer",
        "parent",
        "historical ssl",
        "siblings",
        "resolutions",
        "name verdict",
        "falcon sandbox",
        "pattern match",
        "error",
        "file",
        "indicator",
        "script",
        "typeof e",
        "ascii text",
        "appdata",
        "date",
        "windir",
        "span",
        "body",
        "meta",
        "class",
        "generator",
        "info",
        "null",
        "refresh",
        "hybrid",
        "general",
        "local",
        "click",
        "strings",
        "tools",
        "look",
        "verify",
        "restart",
        "form",
        "footer",
        "html",
        "union",
        "outbreak",
        "downer",
        "shell",
        "mediamagnet",
        "sality",
        "swrort",
        "adaptivebee",
        "unruy",
        "iobit",
        "dropper",
        "trojanx",
        "installcore",
        "webshell",
        "crack",
        "webtoolbar",
        "threat roundup",
        "contacted",
        "june",
        "july",
        "october",
        "august"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Beach Research",
          "display_name": "Beach Research",
          "target": null
        },
        {
          "id": "Maltiverse",
          "display_name": "Maltiverse",
          "target": null
        },
        {
          "id": "WebToolbar",
          "display_name": "WebToolbar",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1176",
          "name": "Browser Extensions",
          "display_name": "T1176 - Browser Extensions"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1090",
          "name": "Proxy",
          "display_name": "T1090 - Proxy"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1102",
          "name": "Web Service",
          "display_name": "T1102 - Web Service"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1199",
          "name": "Trusted Relationship",
          "display_name": "T1199 - Trusted Relationship"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        }
      ],
      "industries": [
        "Health",
        "Nutritional",
        "Medical",
        "Medicine"
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 102,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 400,
        "FileHash-SHA1": 240,
        "FileHash-SHA256": 6459,
        "hostname": 4845,
        "URL": 11514,
        "CVE": 15,
        "domain": 3179,
        "email": 31
      },
      "indicator_count": 26683,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 220,
      "modified_text": "854 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65574cb4447c8d87ad85fa75",
      "name": "Masquerading",
      "description": "",
      "modified": "2023-12-17T11:03:45.376000",
      "created": "2023-11-17T11:21:24.343000",
      "tags": [
        "no expiration",
        "filehashsha256",
        "filehashmd5",
        "iocs",
        "url http",
        "expiration",
        "scan endpoints",
        "all search",
        "otx octoseek",
        "create new",
        "blacklist http",
        "laplasclipper",
        "malicious url",
        "cisco umbrella",
        "site",
        "alexa top",
        "blacklist",
        "safe site",
        "malware site",
        "phishing site",
        "malicious site",
        "malware",
        "china unknown",
        "united",
        "unknown",
        "as54994 quantil",
        "cname",
        "nxdomain",
        "as8068",
        "as4134 chinanet",
        "passive dns",
        "domain",
        "next",
        "filehashsha1",
        "service company",
        "servers",
        "ndicator role",
        "title added",
        "active related",
        "pulses url",
        "showing",
        "entries",
        "pulses http",
        "url https",
        "type indicator",
        "role title",
        "added active",
        "related pulses",
        "report spam",
        "author avatar",
        "created",
        "hour ago",
        "trojanspy",
        "redline",
        "pulses hostname",
        "blacklist https",
        "indicator role",
        "bidid",
        "adid",
        "v4us",
        "v51845481",
        "hostname",
        "http",
        "cisco",
        "umbrella rank",
        "search live",
        "api blog",
        "docs pricing",
        "november",
        "de summary",
        "frankfurt",
        "main",
        "reverse dns",
        "general full",
        "asn16509",
        "amazon02",
        "resource",
        "protocol h2",
        "security tls",
        "hash",
        "de indicators",
        "domains",
        "hashes",
        "copyright",
        "gmbh version",
        "follow",
        "value",
        "postitem",
        "variables",
        "parameters",
        "systemid object",
        "def function",
        "login",
        "get h2",
        "secrets llc",
        "agreement",
        "the site",
        "content",
        "policy",
        "this site",
        "claims",
        "florida",
        "please",
        "premium",
        "service",
        "restrict",
        "express",
        "media",
        "facebook",
        "twitter",
        "final",
        "first",
        "cloudflarenet",
        "gts ca",
        "software",
        "million",
        "hours ago",
        "chameleon",
        "heur",
        "phishing",
        "riskware",
        "agent",
        "unsafe",
        "opencandy",
        "exploit",
        "mimikatz",
        "iframe",
        "downldr",
        "presenoker",
        "artemis",
        "download",
        "beach research",
        "germany",
        "asn20940",
        "akamaiasn1",
        "threat report",
        "url summary",
        "summary",
        "sample",
        "samples",
        "detection list",
        "alexa",
        "maltiverse",
        "google",
        "qtsas",
        "name value",
        "no data",
        "tag count",
        "count blacklist",
        "pbiptbmvd0k4",
        "glelexoputyh",
        "suppobox",
        "team",
        "bambernek",
        "internet storm",
        "phishtank",
        "phish",
        "trickbot",
        "telecom",
        "bank",
        "ipv4",
        "octoseek report",
        "spam https",
        "tsara brashears",
        "malvertizing",
        "tracking",
        "tagging",
        "spyder",
        "cybercrime",
        "email collection",
        "apple data collection",
        "win32 exe",
        "ms word",
        "document",
        "type name",
        "javascript",
        "network capture",
        "files",
        "detections type",
        "name",
        "ssl certificate",
        "whois whois",
        "tsara brashears",
        "whois record",
        "asn owner",
        "highly targeted",
        "kgs0",
        "kls0",
        "relacionada",
        "family",
        "lolkek",
        "emotet",
        "dark power",
        "wiper",
        "ransomware",
        "cobalt strike",
        "quasar rat",
        "ursnif",
        "remcos",
        "core",
        "redline stealer",
        "bitrat",
        "hacktool",
        "critical",
        "copy",
        "installer",
        "execution",
        "network",
        "communicating",
        "referrer",
        "parent",
        "historical ssl",
        "siblings",
        "resolutions",
        "name verdict",
        "falcon sandbox",
        "pattern match",
        "error",
        "file",
        "indicator",
        "script",
        "typeof e",
        "ascii text",
        "appdata",
        "date",
        "windir",
        "span",
        "body",
        "meta",
        "class",
        "generator",
        "info",
        "null",
        "refresh",
        "hybrid",
        "general",
        "local",
        "click",
        "strings",
        "tools",
        "look",
        "verify",
        "restart",
        "form",
        "footer",
        "html",
        "union",
        "outbreak",
        "downer",
        "shell",
        "mediamagnet",
        "sality",
        "swrort",
        "adaptivebee",
        "unruy",
        "iobit",
        "dropper",
        "trojanx",
        "installcore",
        "webshell",
        "crack",
        "webtoolbar",
        "threat roundup",
        "contacted",
        "june",
        "july",
        "october",
        "august"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Beach Research",
          "display_name": "Beach Research",
          "target": null
        },
        {
          "id": "Maltiverse",
          "display_name": "Maltiverse",
          "target": null
        },
        {
          "id": "WebToolbar",
          "display_name": "WebToolbar",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1176",
          "name": "Browser Extensions",
          "display_name": "T1176 - Browser Extensions"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1090",
          "name": "Proxy",
          "display_name": "T1090 - Proxy"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1562",
          "name": "Impair Defenses",
          "display_name": "T1562 - Impair Defenses"
        },
        {
          "id": "T1102",
          "name": "Web Service",
          "display_name": "T1102 - Web Service"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1199",
          "name": "Trusted Relationship",
          "display_name": "T1199 - Trusted Relationship"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1497",
          "name": "Virtualization/Sandbox Evasion",
          "display_name": "T1497 - Virtualization/Sandbox Evasion"
        }
      ],
      "industries": [
        "Health",
        "Nutritional",
        "Medical",
        "Medicine"
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 103,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 400,
        "FileHash-SHA1": 240,
        "FileHash-SHA256": 6459,
        "hostname": 4845,
        "URL": 11514,
        "CVE": 15,
        "domain": 3179,
        "email": 31
      },
      "indicator_count": 26683,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 222,
      "modified_text": "854 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "655652f6ddcbf952a599cded",
      "name": "https://myaccount.uscis.gov/",
      "description": "After Mark Montano Md reported alleged acts by Jeffrey Scott Reimer after receiving 'multiple' reports of him aggressively pursuing Brashears, she was contacted, told she violated the Patriot Act by Big O Tires?!! Received letters from the above and harassed for years. Colorado Workers compensation is so corrupt this may be my last post. She was immediately framed , blamed, porn smeared and stalked. Denied medical care , when received died on surgery table, revised and disabled. Even the mafia would  tackle only the associates bringing undue negative attention to their  own organization.",
      "modified": "2023-12-16T15:00:49.451000",
      "created": "2023-11-16T17:35:50.285000",
      "tags": [
        "whois record",
        "ssl certificate",
        "whois whois",
        "communicating",
        "referrer",
        "ip address",
        "contacted",
        "pe resource",
        "historical ssl",
        "collections wow",
        "cobalt",
        "stealer",
        "quasar",
        "remcos",
        "ursnif",
        "fabookie",
        "name verdict",
        "exit",
        "node tcp",
        "traffic",
        "united",
        "et tor",
        "known tor",
        "relayrouter",
        "anonymizer",
        "tor known",
        "tor relayrouter",
        "cisco umbrella",
        "site",
        "safe site",
        "heur",
        "maltiverse",
        "million",
        "alexa top",
        "unsafe",
        "html",
        "team",
        "riskware",
        "malware",
        "phishing",
        "union",
        "bank",
        "outbreak",
        "downer",
        "shell",
        "mediamagnet",
        "sality",
        "swrort",
        "adaptivebee",
        "unruy",
        "iobit",
        "dropper",
        "trojanx",
        "artemis",
        "installcore",
        "webshell",
        "exploit",
        "crack",
        "webtoolbar",
        "detection list",
        "blacklist http",
        "september",
        "threat roundup",
        "execution",
        "metro",
        "formbook",
        "kgs0",
        "kls0",
        "blacklist https",
        "malicious site",
        "malware site",
        "phishing site",
        "download",
        "malicious",
        "azorult",
        "service",
        "runescape",
        "facebook",
        "genkryptik",
        "fuery",
        "wacatac",
        "alexa",
        "dbatloader",
        "nanocore rat",
        "agent tesla",
        "binder",
        "dridex",
        "hawkeye",
        "small",
        "netwire",
        "trojan",
        "redline stealer",
        "lumma stealer",
        "trojanspy",
        "redline",
        "lumma",
        "tsara brashears",
        "whois",
        "asn owner",
        "highly targeted",
        "relacionada",
        "lolkek",
        "emotet",
        "dark power",
        "wiper",
        "ransomware",
        "cobalt strike",
        "quasar rat",
        "core",
        "bitrat",
        "hacktool",
        "critical",
        "copy",
        "installer",
        "meta",
        "as15169 google",
        "aaaa",
        "a domains",
        "videosdewebcams",
        "search",
        "passive dns",
        "urls",
        "record value",
        "date",
        "certificate",
        "scan endpoints",
        "all octoseek",
        "pulse pulses",
        "files"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Germany"
      ],
      "malware_families": [
        {
          "id": "WebToolbar",
          "display_name": "WebToolbar",
          "target": null
        },
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        },
        {
          "id": "RedLine",
          "display_name": "RedLine",
          "target": null
        },
        {
          "id": "Lumma",
          "display_name": "Lumma",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1090",
          "name": "Proxy",
          "display_name": "T1090 - Proxy"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 100,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 204,
        "FileHash-SHA1": 182,
        "FileHash-SHA256": 6268,
        "URL": 13989,
        "domain": 3229,
        "hostname": 4412,
        "CVE": 19,
        "email": 3
      },
      "indicator_count": 28306,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 224,
      "modified_text": "855 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "655686e2c072557f03e9cba2",
      "name": "https://myaccount.uscis.gov/                         [pulse created by Octoseek]",
      "description": "",
      "modified": "2023-12-16T15:00:49.451000",
      "created": "2023-11-16T21:17:22.087000",
      "tags": [
        "whois record",
        "ssl certificate",
        "whois whois",
        "communicating",
        "referrer",
        "ip address",
        "contacted",
        "pe resource",
        "historical ssl",
        "collections wow",
        "cobalt",
        "stealer",
        "quasar",
        "remcos",
        "ursnif",
        "fabookie",
        "name verdict",
        "exit",
        "node tcp",
        "traffic",
        "united",
        "et tor",
        "known tor",
        "relayrouter",
        "anonymizer",
        "tor known",
        "tor relayrouter",
        "cisco umbrella",
        "site",
        "safe site",
        "heur",
        "maltiverse",
        "million",
        "alexa top",
        "unsafe",
        "html",
        "team",
        "riskware",
        "malware",
        "phishing",
        "union",
        "bank",
        "outbreak",
        "downer",
        "shell",
        "mediamagnet",
        "sality",
        "swrort",
        "adaptivebee",
        "unruy",
        "iobit",
        "dropper",
        "trojanx",
        "artemis",
        "installcore",
        "webshell",
        "exploit",
        "crack",
        "webtoolbar",
        "detection list",
        "blacklist http",
        "september",
        "threat roundup",
        "execution",
        "metro",
        "formbook",
        "kgs0",
        "kls0",
        "blacklist https",
        "malicious site",
        "malware site",
        "phishing site",
        "download",
        "malicious",
        "azorult",
        "service",
        "runescape",
        "facebook",
        "genkryptik",
        "fuery",
        "wacatac",
        "alexa",
        "dbatloader",
        "nanocore rat",
        "agent tesla",
        "binder",
        "dridex",
        "hawkeye",
        "small",
        "netwire",
        "trojan",
        "redline stealer",
        "lumma stealer",
        "trojanspy",
        "redline",
        "lumma",
        "tsara brashears",
        "whois",
        "asn owner",
        "highly targeted",
        "relacionada",
        "lolkek",
        "emotet",
        "dark power",
        "wiper",
        "ransomware",
        "cobalt strike",
        "quasar rat",
        "core",
        "bitrat",
        "hacktool",
        "critical",
        "copy",
        "installer",
        "meta",
        "as15169 google",
        "aaaa",
        "a domains",
        "videosdewebcams",
        "search",
        "passive dns",
        "urls",
        "record value",
        "date",
        "certificate",
        "scan endpoints",
        "all octoseek",
        "pulse pulses",
        "files"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Germany"
      ],
      "malware_families": [
        {
          "id": "WebToolbar",
          "display_name": "WebToolbar",
          "target": null
        },
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        },
        {
          "id": "RedLine",
          "display_name": "RedLine",
          "target": null
        },
        {
          "id": "Lumma",
          "display_name": "Lumma",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1090",
          "name": "Proxy",
          "display_name": "T1090 - Proxy"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": "655650c9b2be6cc930c92cf3",
      "export_count": 102,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 204,
        "FileHash-SHA1": 182,
        "FileHash-SHA256": 6268,
        "URL": 13989,
        "domain": 3229,
        "hostname": 4412,
        "CVE": 19,
        "email": 3
      },
      "indicator_count": 28306,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 225,
      "modified_text": "855 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "655657ca2e402d4f98283de9",
      "name": "https://myaccount.uscis.gov/ ",
      "description": "",
      "modified": "2023-12-16T15:00:49.451000",
      "created": "2023-11-16T17:56:26.312000",
      "tags": [
        "whois record",
        "ssl certificate",
        "whois whois",
        "communicating",
        "referrer",
        "ip address",
        "contacted",
        "pe resource",
        "historical ssl",
        "collections wow",
        "cobalt",
        "stealer",
        "quasar",
        "remcos",
        "ursnif",
        "fabookie",
        "name verdict",
        "exit",
        "node tcp",
        "traffic",
        "united",
        "et tor",
        "known tor",
        "relayrouter",
        "anonymizer",
        "tor known",
        "tor relayrouter",
        "cisco umbrella",
        "site",
        "safe site",
        "heur",
        "maltiverse",
        "million",
        "alexa top",
        "unsafe",
        "html",
        "team",
        "riskware",
        "malware",
        "phishing",
        "union",
        "bank",
        "outbreak",
        "downer",
        "shell",
        "mediamagnet",
        "sality",
        "swrort",
        "adaptivebee",
        "unruy",
        "iobit",
        "dropper",
        "trojanx",
        "artemis",
        "installcore",
        "webshell",
        "exploit",
        "crack",
        "webtoolbar",
        "detection list",
        "blacklist http",
        "september",
        "threat roundup",
        "execution",
        "metro",
        "formbook",
        "kgs0",
        "kls0",
        "blacklist https",
        "malicious site",
        "malware site",
        "phishing site",
        "download",
        "malicious",
        "azorult",
        "service",
        "runescape",
        "facebook",
        "genkryptik",
        "fuery",
        "wacatac",
        "alexa",
        "dbatloader",
        "nanocore rat",
        "agent tesla",
        "binder",
        "dridex",
        "hawkeye",
        "small",
        "netwire",
        "trojan",
        "redline stealer",
        "lumma stealer",
        "trojanspy",
        "redline",
        "lumma",
        "tsara brashears",
        "whois",
        "asn owner",
        "highly targeted",
        "relacionada",
        "lolkek",
        "emotet",
        "dark power",
        "wiper",
        "ransomware",
        "cobalt strike",
        "quasar rat",
        "core",
        "bitrat",
        "hacktool",
        "critical",
        "copy",
        "installer",
        "meta",
        "as15169 google",
        "aaaa",
        "a domains",
        "videosdewebcams",
        "search",
        "passive dns",
        "urls",
        "record value",
        "date",
        "certificate",
        "scan endpoints",
        "all octoseek",
        "pulse pulses",
        "files"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Germany"
      ],
      "malware_families": [
        {
          "id": "WebToolbar",
          "display_name": "WebToolbar",
          "target": null
        },
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        },
        {
          "id": "RedLine",
          "display_name": "RedLine",
          "target": null
        },
        {
          "id": "Lumma",
          "display_name": "Lumma",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1090",
          "name": "Proxy",
          "display_name": "T1090 - Proxy"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": "655650c9b2be6cc930c92cf3",
      "export_count": 100,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 204,
        "FileHash-SHA1": 182,
        "FileHash-SHA256": 6268,
        "URL": 13989,
        "domain": 3229,
        "hostname": 4412,
        "CVE": 19,
        "email": 3
      },
      "indicator_count": 28306,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 221,
      "modified_text": "855 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65565477da453c46f05a6ac4",
      "name": "BTW VirusTotal - \" interesting files written to disk during execution'",
      "description": "",
      "modified": "2023-12-16T15:00:49.451000",
      "created": "2023-11-16T17:42:15.123000",
      "tags": [
        "whois record",
        "ssl certificate",
        "whois whois",
        "communicating",
        "referrer",
        "ip address",
        "contacted",
        "pe resource",
        "historical ssl",
        "collections wow",
        "cobalt",
        "stealer",
        "quasar",
        "remcos",
        "ursnif",
        "fabookie",
        "name verdict",
        "exit",
        "node tcp",
        "traffic",
        "united",
        "et tor",
        "known tor",
        "relayrouter",
        "anonymizer",
        "tor known",
        "tor relayrouter",
        "cisco umbrella",
        "site",
        "safe site",
        "heur",
        "maltiverse",
        "million",
        "alexa top",
        "unsafe",
        "html",
        "team",
        "riskware",
        "malware",
        "phishing",
        "union",
        "bank",
        "outbreak",
        "downer",
        "shell",
        "mediamagnet",
        "sality",
        "swrort",
        "adaptivebee",
        "unruy",
        "iobit",
        "dropper",
        "trojanx",
        "artemis",
        "installcore",
        "webshell",
        "exploit",
        "crack",
        "webtoolbar",
        "detection list",
        "blacklist http",
        "september",
        "threat roundup",
        "execution",
        "metro",
        "formbook",
        "kgs0",
        "kls0",
        "blacklist https",
        "malicious site",
        "malware site",
        "phishing site",
        "download",
        "malicious",
        "azorult",
        "service",
        "runescape",
        "facebook",
        "genkryptik",
        "fuery",
        "wacatac",
        "alexa",
        "dbatloader",
        "nanocore rat",
        "agent tesla",
        "binder",
        "dridex",
        "hawkeye",
        "small",
        "netwire",
        "trojan",
        "redline stealer",
        "lumma stealer",
        "trojanspy",
        "redline",
        "lumma",
        "tsara brashears",
        "whois",
        "asn owner",
        "highly targeted",
        "relacionada",
        "lolkek",
        "emotet",
        "dark power",
        "wiper",
        "ransomware",
        "cobalt strike",
        "quasar rat",
        "core",
        "bitrat",
        "hacktool",
        "critical",
        "copy",
        "installer",
        "meta",
        "as15169 google",
        "aaaa",
        "a domains",
        "videosdewebcams",
        "search",
        "passive dns",
        "urls",
        "record value",
        "date",
        "certificate",
        "scan endpoints",
        "all octoseek",
        "pulse pulses",
        "files"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Germany"
      ],
      "malware_families": [
        {
          "id": "WebToolbar",
          "display_name": "WebToolbar",
          "target": null
        },
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        },
        {
          "id": "RedLine",
          "display_name": "RedLine",
          "target": null
        },
        {
          "id": "Lumma",
          "display_name": "Lumma",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1090",
          "name": "Proxy",
          "display_name": "T1090 - Proxy"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": "655650c9b2be6cc930c92cf3",
      "export_count": 101,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 204,
        "FileHash-SHA1": 182,
        "FileHash-SHA256": 6268,
        "URL": 13989,
        "domain": 3229,
        "hostname": 4412,
        "CVE": 19,
        "email": 3
      },
      "indicator_count": 28306,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 223,
      "modified_text": "855 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://bbs.jqueryapi.info",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://bbs.jqueryapi.info",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776638684.0621607
}